Efficient set operations in the presence of malicious adversaries

From MaRDI portal
Revision as of 05:02, 30 January 2024 by Import240129110155 (talk | contribs) (Created automatically from import240129110155)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Publication:434343


DOI10.1007/s00145-011-9098-xzbMath1272.94034WikidataQ59379655 ScholiaQ59379655MaRDI QIDQ434343

Carmit Hazay, Kobbi Nissim

Publication date: 10 July 2012

Published in: Journal of Cryptology (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/s00145-011-9098-x


94A60: Cryptography


Related Items



Cites Work