Back to Results
First PageMeta Content
Secure two-party computation / Pseudorandomness / Random oracle / Security parameter / Zero-knowledge proof / IP / Universal composability / Verifiable secret sharing / Cryptography / Cryptographic protocols / Secure multi-party computation


Efficient Protocols for Set Intersection and Pattern Matching with Security Against Malicious and Covert Adversaries∗ Carmit Hazay† Yehuda Lindell†
Add to Reading List

Document Date: 2014-09-16 05:37:56


Open Document

File Size: 370,41 KB

Share Result on Facebook
UPDATE