Cryptology ePrint Archive: Report 2009/045

Available versions in chronological order


Efficient Protocols for Set Intersection and Pattern Matching with Security Against Malicious and Covert Adversaries
Carmit Hazay and Yehuda Lindell
Publication Info: An extended abstract of this paper appeared in TCC 2008; this is the full version.


[ Cryptology ePrint archive ]