Efficient Protocols for Set Intersection and Pattern Matching with Security Against Malicious and Covert Adversaries. (2008)

by C Hazay, Y Lindell
Venue:Proceedings of the 5th Conference on Theory of Cryptography, Lecture Notes in Computer Science 4948,