Login / Signup

Computationally Secure Pattern Matching in the Presence of Malicious Adversaries.

Carmit HazayTomas Toft
Published in: J. Cryptol. (2014)
Keyphrases