Efficient Set Operations in the Presence of Malicious Adversaries

Carmit Hazay, Kobbi Nissim

J. Cryptol.  — 2012

BibTeX

@article{DBLP:journals/joc/HazayN12,
  author = {Hazay, Carmit and Nissim, Kobbi},
  title = {Efficient Set Operations in the Presence of Malicious Adversaries},
  journal = {J. Cryptol.},
  volume = {25},
  number = {3},
  pages = {383--433},
  year = {2012},
  url = {https://doi.org/10.1007/s00145-011-9098-x},
  doi = {10.1007/S00145-011-9098-X},
  timestamp = {Sun, 04 Jan 2026 00:00:00 +0100},
  biburl = {https://dblp.org/rec/journals/joc/HazayN12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}