Cryptology ePrint Archive: Report 2009/594
Available versions in chronological order
20091204:084845 (posted 04-Dec-2009 08:48:45 UTC)
Efficient Set Operations in the Presence of Malicious Adversaries
Carmit Hazay and Kobbi Nissim
20100504:115203 (posted 04-May-2010 11:52:03 UTC)
Efficient Set Operations in the Presence of Malicious Adversaries
Carmit Hazay and Kobbi Nissim
20100504:115736 (posted 04-May-2010 11:57:36 UTC)
Efficient Set Operations in the Presence of Malicious Adversaries
Carmit Hazay and Kobbi Nissim
[
Cryptology ePrint archive
]