Efficient set operations in the presence of malicious adversaries

From MaRDI portal
Publication:434343

DOI10.1007/s00145-011-9098-xzbMath1272.94034OpenAlexW2167485997WikidataQ59379655 ScholiaQ59379655MaRDI QIDQ434343

Carmit Hazay, Kobbi Nissim

Publication date: 10 July 2012

Published in: Journal of Cryptology (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/s00145-011-9098-x




Related Items (8)



Cites Work


This page was built for publication: Efficient set operations in the presence of malicious adversaries