Efficient Set Operations in the Presence of Malicious Adversaries

Carmit Hazay, Kobbi Nissim

IACR Cryptol. ePrint Arch.  — 2009

BibTeX

@article{DBLP:journals/iacr/HazayN09,
  author = {Hazay, Carmit and Nissim, Kobbi},
  title = {Efficient Set Operations in the Presence of Malicious Adversaries},
  journal = {{IACR} Cryptol. ePrint Arch.},
  pages = {594},
  year = {2009},
  url = {http://eprint.iacr.org/2009/594},
  timestamp = {Mon, 11 May 2020 01:00:00 +0200},
  biburl = {https://dblp.org/rec/journals/iacr/HazayN09.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}