-
1
-
-
4043168634
-
The IBM PCIXCC: A new cryptographic coprocessor for the IBM eserver
-
May
-
T. W. Arnold and L. P. Van Doorn, "The IBM PCIXCC: A new cryptographic coprocessor for the IBM eserver," IBM J. Res. Devel., vol. 48, pp. 475-487, May 2004.
-
(2004)
IBM J. Res. Devel.
, vol.48
, pp. 475-487
-
-
Arnold, T.W.1
Van Doorn, L.P.2
-
2
-
-
0036957230
-
Breaking the?#INF#?#/INF#i/(2?-1) ·i barrier for information-theoretic private information retrieval
-
A. Beimel, Y. Ishai, E. Kushilevitz, and J.-F. Raymond, "Breaking the?#INF#?#/INF#i/(2?-1) ·i barrier for information-theoretic private information retrieval," in Proc. IEEE FOCS'02, 2002, pp. 261-270.
-
(2002)
Proc. IEEE FOCS'02
, pp. 261-270
-
-
Beimel, A.1
Ishai, Y.2
Kushilevitz, E.3
Raymond, J.-F.4
-
3
-
-
84974593790
-
Reducing the servers computation in private information retrieval: PIR with preprocessing
-
A. Beimel, Y. Ishai, and T. Malkin, "Reducing the servers computation in private information retrieval: PIR with preprocessing," in Proc. CRYPTO'00, 2000, pp. 55-73.
-
(2000)
Proc. CRYPTO'00
, pp. 55-73
-
-
Beimel, A.1
Ishai, Y.2
Malkin, T.3
-
4
-
-
84944886613
-
Ciphers with arbitrary finite domains
-
J. Black and P. Rogaway, "Ciphers with arbitrary finite domains," in Proc. CT-RSA 2002, pp. 114-130.
-
Proc. CT-RSA 2002
, pp. 114-130
-
-
Black, J.1
Rogaway, P.2
-
5
-
-
0030645563
-
Computationally private information retrieval
-
B. Chor and N. Gilboa, "Computationally private information retrieval," in Proc. 29th STOC'97, 1997, pp. 304-313.
-
(1997)
Proc. 29th STOC'97
, pp. 304-313
-
-
Chor, B.1
Gilboa, N.2
-
6
-
-
0001835239
-
Private information retrieval
-
B. Chor, E. Kushilevitz, O. Goldreich, and M. Sudan, "Private information retrieval," in Proc. IEEE FOCS'95, 1995, pp. 41-51.
-
(1995)
Proc. IEEE FOCS'95
, pp. 41-51
-
-
Chor, B.1
Kushilevitz, E.2
Goldreich, O.3
Sudan, M.4
-
7
-
-
63449103075
-
A length-flexible threshold cryptosystem with applications
-
Information Security and Privacy
-
I. Damgård and M. Jurik, "A length-flexible threshold cryptosystem with applications," in Proc. 8th Australasian Conf. Information Security andPrivacy, 2003, pp. 350-364. (Pubitemid 36892647)
-
(2003)
Lecture Notes in Computer Science
, Issue.2727
, pp. 350-364
-
-
Damgard, I.1
Jurik, M.2
-
8
-
-
0030149547
-
Software protection and simulation on oblivious RAMs
-
O. Goldreich and R. Ostrovsky, "Software protection and simulation on oblivious rams," J. ACM, vol. 43, no. 3, pp. 431-473, 1996. (Pubitemid 126607640)
-
(1996)
Journal of the ACM
, vol.43
, Issue.3
, pp. 431-473
-
-
Goldreich, O.1
Ostrovsky, R.2
-
9
-
-
33750252128
-
Private information storage with logarithmspace secure hardware
-
A. Iliev and S. Smith, "Private information storage with logarithmspace secure hardware," in Proc. Int. Information Security Workshops, 2004, pp. 199-214.
-
(2004)
Proc. Int. Information Security Workshops
, pp. 199-214
-
-
Iliev, A.1
Smith, S.2
-
10
-
-
17444392883
-
Protecting client privacy with trusted computing at the server
-
DOI 10.1109/MSP.2005.49
-
A. Ilievand S. Smith, "Protecting clientprivacy withtrusted computing at the server," IEEE Security Privacy, vol. 3, no. 2, pp. 20-28, Mar./Apr. 2005. (Pubitemid 40542058)
-
(2005)
IEEE Security and Privacy
, vol.3
, Issue.2
, pp. 20-28
-
-
Iliev, A.1
Smith, S.W.2
-
11
-
-
0031378815
-
Replication is not needed: Single database, computationally private information retrieval
-
E. Kushilevitz and R. Ostrovsky, "Replication is not needed: Single database, computationally private information retrieval," in Proc. 38th IEEEFOCS'97, 1997, pp. 364-373.
-
(1997)
Proc. 38th IEEEFOCS'97
, pp. 364-373
-
-
Kushilevitz, E.1
Ostrovsky, R.2
-
12
-
-
84948954750
-
One-way trapdoor permutations are sufficient for non-trivial single-server private information retrieval
-
E. Kushilevitz and R. Ostrovsky, "One-way trapdoor permutations are sufficient for non-trivial single-server private information retrieval," in Proc. Eurocrypt'00, 2000, pp. 104-121.
-
(2000)
Proc. Eurocrypt'00
, pp. 104-121
-
-
Kushilevitz, E.1
Ostrovsky, R.2
-
13
-
-
77951736617
-
An oblivious transfer protocol with log-squared communication
-
H. Lipmaa, "An oblivious transfer protocol with log-squared communication," in Proc. ISC 2005, pp. 324-328.
-
Proc. ISC 2005
, pp. 324-328
-
-
Lipmaa, H.1
-
15
-
-
77957007201
-
Oblivious ramrevisited
-
B. Pinkas and T. Reinman, "Oblivious ramrevisited," in Proc. CRYPTO 2010, pp. 502-519.
-
(2010)
Proc. CRYPTO
, pp. 502-519
-
-
Pinkas, B.1
Reinman, T.2
-
17
-
-
85141026002
-
On the computational practicality ofprivate information retrieval
-
R. Sion and B. Carbunar, "On the computational practicality ofprivate information retrieval," in Proc. NDSS'07, San Diego, CA, 2007.
-
(2007)
Proc. NDSS'07, San Diego, CA
-
-
Sion, R.1
Carbunar, B.2
-
18
-
-
0034809926
-
Practical server privacy with secure coprocessors
-
S. Smith and D. Safford, "Practical server privacy with secure coprocessors," IBMSyst. J., vol. 40, no. 3, pp. 683-695, 2001. (Pubitemid 32933425)
-
(2001)
IBM Systems Journal
, vol.40
, Issue.3
, pp. 683-695
-
-
Smith, S.W.1
Safford, D.2
-
19
-
-
33750268079
-
Private information retrieval using trusted hardware
-
Computer Security - ESORICS 2006 - 11th European Symposium on Research in Computer Security, Proceedings
-
S. Wang, X. Ding, R. Deng, and F. Bao, "Private information retrieval using trusted hardware," in Proc. 11th ESORICS'06, 2006, pp. 49-64. (Pubitemid 44609848)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4189
, pp. 49-64
-
-
Wang, S.1
Ding, X.2
Deng, R.H.3
Bao, F.4
-
21
-
-
70349278621
-
Building castles out of mud: Practical access pattern privacy and correctness on untrusted storage
-
P. Williams, R. Sion, and B. Carbunar, "Building castles out of mud: Practical access pattern privacy and correctness on untrusted storage," in Proc. ACM CCS 2008, pp. 139-148.
-
(2008)
Proc. ACM CCS
, pp. 139-148
-
-
Williams, P.1
Sion, R.2
Carbunar, B.3
-
22
-
-
56649105071
-
An efficient pir construction using trusted hardware
-
Y. Yang, X. Ding, R. Deng, and F. Bao, "An efficient pir construction using trusted hardware," in Proc. Information Security Conf., 2008, pp. 64-79.
-
(2008)
Proc. Information Security Conf.
, pp. 64-79
-
-
Yang, Y.1
Ding, X.2
Deng, R.3
Bao, F.4
|