Efficient Set Operations in the Presence of Malicious Adversaries
Carmit Hazay, Kobbi Nissim
BibTeX
@article{DBLP:journals/joc/HazayN12,
author = {Hazay, Carmit and Nissim, Kobbi},
title = {Efficient Set Operations in the Presence of Malicious Adversaries},
journal = {J. Cryptol.},
volume = {25},
number = {3},
pages = {383--433},
year = {2012},
url = {https://doi.org/10.1007/s00145-011-9098-x},
doi = {10.1007/S00145-011-9098-X},
timestamp = {Sun, 04 Jan 2026 00:00:00 +0100},
biburl = {https://dblp.org/rec/journals/joc/HazayN12.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}