Efficient set operations in the presence of malicious adversaries

From MaRDI portal
Publication:434343


DOI10.1007/s00145-011-9098-xzbMath1272.94034WikidataQ59379655 ScholiaQ59379655MaRDI QIDQ434343

Carmit Hazay, Kobbi Nissim

Publication date: 10 July 2012

Published in: Journal of Cryptology (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/s00145-011-9098-x


94A60: Cryptography


Related Items



Cites Work