2018
DOI: 10.1007/s10207-018-0410-8
|View full text |Cite
|
Sign up to set email alerts
|

Secure pattern matching based on bit parallelism

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3

Citation Types

0
3
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(3 citation statements)
references
References 30 publications
0
3
0
Order By: Relevance
“…Shift‐ADD based . Samadani et al 13 and Zarezadeh et al 14 have solved the problem of WPM in the malicious setting by using the Shift‐ADD algorithm. We observe that the approach in Reference [13] has a lower computation cost of MJX-tex-caligraphicscriptO((n+m)ρ) ${\mathscr{O}}((n+m)\rho )$, where ρ $\rho $ is the correctness parameter.…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations
“…Shift‐ADD based . Samadani et al 13 and Zarezadeh et al 14 have solved the problem of WPM in the malicious setting by using the Shift‐ADD algorithm. We observe that the approach in Reference [13] has a lower computation cost of MJX-tex-caligraphicscriptO((n+m)ρ) ${\mathscr{O}}((n+m)\rho )$, where ρ $\rho $ is the correctness parameter.…”
Section: Introductionmentioning
confidence: 99%
“…Samadani et al 13 and Zarezadeh et al 14 have solved the problem of WPM in the malicious setting by using the Shift‐ADD algorithm. We observe that the approach in Reference [13] has a lower computation cost of MJX-tex-caligraphicscriptO((n+m)ρ) ${\mathscr{O}}((n+m)\rho )$, where ρ $\rho $ is the correctness parameter. The approach in Reference [14] has a lower communication cost of MJX-tex-caligraphicscriptO((n+m)k) ${\mathscr{O}}((n+m)k)$, where k $k$ is the security parameter.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation