Efficient Set Intersection with Simulation-Based Security. Freedman, M. J., Hazay, C., Nissim, K., & Pinkas, B. J. Cryptology, 29(1):115-155, 2016. Link Paper bibtex @article{journals/joc/FreedmanHNP16,
added-at = {2019-06-02T00:00:00.000+0200},
author = {Freedman, Michael J. and Hazay, Carmit and Nissim, Kobbi and Pinkas, Benny},
biburl = {https://www.bibsonomy.org/bibtex/23c18a2f64527f90a0bd698518e5f85f6/dblp},
ee = {https://www.wikidata.org/entity/Q59379588},
interhash = {1b8b8e645f4a08bba42d784232b75ffb},
intrahash = {3c18a2f64527f90a0bd698518e5f85f6},
journal = {J. Cryptology},
keywords = {dblp},
number = 1,
pages = {115-155},
timestamp = {2019-06-04T11:39:47.000+0200},
title = {Efficient Set Intersection with Simulation-Based Security.},
url = {http://dblp.uni-trier.de/db/journals/joc/joc29.html#FreedmanHNP16},
volume = 29,
year = 2016
}
Downloads: 0
{"_id":"ZwAReGP8kQLJ8FW8D","bibbaseid":"freedman-hazay-nissim-pinkas-efficientsetintersectionwithsimulationbasedsecurity-2016","authorIDs":[],"author_short":["Freedman, M. J.","Hazay, C.","Nissim, K.","Pinkas, B."],"bibdata":{"bibtype":"article","type":"article","added-at":"2019-06-02T00:00:00.000+0200","author":[{"propositions":[],"lastnames":["Freedman"],"firstnames":["Michael","J."],"suffixes":[]},{"propositions":[],"lastnames":["Hazay"],"firstnames":["Carmit"],"suffixes":[]},{"propositions":[],"lastnames":["Nissim"],"firstnames":["Kobbi"],"suffixes":[]},{"propositions":[],"lastnames":["Pinkas"],"firstnames":["Benny"],"suffixes":[]}],"biburl":"https://www.bibsonomy.org/bibtex/23c18a2f64527f90a0bd698518e5f85f6/dblp","ee":"https://www.wikidata.org/entity/Q59379588","interhash":"1b8b8e645f4a08bba42d784232b75ffb","intrahash":"3c18a2f64527f90a0bd698518e5f85f6","journal":"J. Cryptology","keywords":"dblp","number":"1","pages":"115-155","timestamp":"2019-06-04T11:39:47.000+0200","title":"Efficient Set Intersection with Simulation-Based Security.","url":"http://dblp.uni-trier.de/db/journals/joc/joc29.html#FreedmanHNP16","volume":"29","year":"2016","bibtex":"@article{journals/joc/FreedmanHNP16,\n added-at = {2019-06-02T00:00:00.000+0200},\n author = {Freedman, Michael J. and Hazay, Carmit and Nissim, Kobbi and Pinkas, Benny},\n biburl = {https://www.bibsonomy.org/bibtex/23c18a2f64527f90a0bd698518e5f85f6/dblp},\n ee = {https://www.wikidata.org/entity/Q59379588},\n interhash = {1b8b8e645f4a08bba42d784232b75ffb},\n intrahash = {3c18a2f64527f90a0bd698518e5f85f6},\n journal = {J. Cryptology},\n keywords = {dblp},\n number = 1,\n pages = {115-155},\n timestamp = {2019-06-04T11:39:47.000+0200},\n title = {Efficient Set Intersection with Simulation-Based Security.},\n url = {http://dblp.uni-trier.de/db/journals/joc/joc29.html#FreedmanHNP16},\n volume = 29,\n year = 2016\n}\n\n","author_short":["Freedman, M. J.","Hazay, C.","Nissim, K.","Pinkas, B."],"key":"journals/joc/FreedmanHNP16","id":"journals/joc/FreedmanHNP16","bibbaseid":"freedman-hazay-nissim-pinkas-efficientsetintersectionwithsimulationbasedsecurity-2016","role":"author","urls":{"Link":"https://www.wikidata.org/entity/Q59379588","Paper":"http://dblp.uni-trier.de/db/journals/joc/joc29.html#FreedmanHNP16"},"keyword":["dblp"],"downloads":0},"bibtype":"article","biburl":"http://www.bibsonomy.org/bib/author/benny pinkas?items=1000","creationDate":"2019-08-20T14:01:14.073Z","downloads":0,"keywords":["dblp"],"search_terms":["efficient","set","intersection","simulation","based","security","freedman","hazay","nissim","pinkas"],"title":"Efficient Set Intersection with Simulation-Based Security.","year":2016,"dataSources":["cqD7CZfhPQfyEKZAn"]}