Efficient Protocols for Set Intersection and Pattern Matching with Security Against Malicious and Covert Adversaries Posted June 19, 2016 by Alon