Cryptology ePrint Archive: Report 2009/594

Available versions in chronological order


Efficient Set Operations in the Presence of Malicious Adversaries
Carmit Hazay and Kobbi Nissim

Efficient Set Operations in the Presence of Malicious Adversaries
Carmit Hazay and Kobbi Nissim

Efficient Set Operations in the Presence of Malicious Adversaries
Carmit Hazay and Kobbi Nissim


[ Cryptology ePrint archive ]