-
1
-
-
77954755618
-
Oblivious RAMs without cryptographic assumptions
-
Schulman, L.J. (ed.) ACM
-
Ajtai, M.: Oblivious RAMs without cryptographic assumptions. In: Schulman, L.J. (ed.) STOC, pp. 181-190. ACM (2010)
-
(2010)
STOC
, pp. 181-190
-
-
Ajtai, M.1
-
2
-
-
80955149556
-
-
Technical Report MIT-CSAIL-TR-2011-018, Massachusetts Institute of Technology
-
Boneh, D., Mazieres, D., Popa, R.A.: Remote Oblivious Storage: Making Oblivious RAM Practical. Technical Report MIT-CSAIL-TR-2011-018, Massachusetts Institute of Technology (2011)
-
(2011)
Remote Oblivious Storage: Making Oblivious RAM Practical
-
-
Boneh, D.1
Mazieres, D.2
Popa, R.A.3
-
3
-
-
0029541045
-
Private Information Retrieval
-
IEEE Computer Society
-
Chor, B., Goldreich, O., Kushilevitz, E., Sudan, M.: Private Information Retrieval. In: FOCS, pp. 41-50. IEEE Computer Society (1995)
-
(1995)
FOCS
, pp. 41-50
-
-
Chor, B.1
Goldreich, O.2
Kushilevitz, E.3
Sudan, M.4
-
4
-
-
79953223285
-
Perfectly Secure Oblivious RAM without Random Oracles
-
Ishai, Y. (ed.) TCC 2011. Springer, Heidelberg
-
Damgård, I., Meldgaard, S., Nielsen, J.B.: Perfectly Secure Oblivious RAM without Random Oracles. In: Ishai, Y. (ed.) TCC 2011. LNCS, vol. 6597, pp. 144-163. Springer, Heidelberg (2011)
-
(2011)
LNCS
, vol.6597
, pp. 144-163
-
-
Damgård, I.1
Meldgaard, S.2
Nielsen, J.B.3
-
5
-
-
0023547498
-
Towards a Theory of Software Protection and Simulation by Oblivious RAMs
-
Aho, A.V. (ed.) ACM
-
Goldreich, O.: Towards a Theory of Software Protection and Simulation by Oblivious RAMs. In: Aho, A.V. (ed.) STOC, pp. 182-194. ACM (1987)
-
(1987)
STOC
, pp. 182-194
-
-
Goldreich, O.1
-
6
-
-
0030149547
-
Software Protection and Simulation on Oblivious RAMs
-
Goldreich, O., Ostrovsky, R.: Software Protection and Simulation on Oblivious RAMs. J. ACM 43(3), 431-473 (1996)
-
(1996)
J. ACM
, vol.43
, Issue.3
, pp. 431-473
-
-
Goldreich, O.1
Ostrovsky, R.2
-
7
-
-
79959681766
-
Data-Oblivious External-Memory Algorithms for the Compaction, Selection, and Sorting of Outsourced Data
-
Rajaraman, R., Meyer auf der Heide, F. (eds.) ACM
-
Goodrich, M.T.: Data-Oblivious External-Memory Algorithms for the Compaction, Selection, and Sorting of Outsourced Data. In: Rajaraman, R., Meyer auf der Heide, F. (eds.) SPAA, pp. 379-388. ACM (2011)
-
(2011)
SPAA
, pp. 379-388
-
-
Goodrich, M.T.1
-
8
-
-
79960005023
-
Privacy-Preserving Access of Outsourced Data via Oblivious RAMSimulation
-
Aceto, L., Henzinger, M., Sgall, J. (eds.) ICALP 2011, Part II. Springer, Heidelberg
-
Goodrich, M.T., Mitzenmacher, M.: Privacy-Preserving Access of Outsourced Data via Oblivious RAMSimulation. In: Aceto, L., Henzinger, M., Sgall, J. (eds.) ICALP 2011, Part II. LNCS, vol. 6756, pp. 576-587. Springer, Heidelberg (2011)
-
(2011)
LNCS
, vol.6756
, pp. 576-587
-
-
Goodrich, M.T.1
Mitzenmacher, M.2
-
9
-
-
80955131283
-
Oblivious RAM simulation with Efficient Worst-Case Access Overhead
-
Cachin, C., Ristenpart, T. (eds.) ACM
-
Goodrich, M.T., Mitzenmacher, M., Ohrimenko, O., Tamassia, R.: Oblivious RAM simulation with Efficient Worst-Case Access Overhead. In: Cachin, C., Ristenpart, T. (eds.) CCSW, pp. 95-100. ACM (2011)
-
(2011)
CCSW
, pp. 95-100
-
-
Goodrich, M.T.1
Mitzenmacher, M.2
Ohrimenko, O.3
Tamassia, R.4
-
10
-
-
84869401018
-
Practical Oblivious Storage
-
Bertino, E., Sandhu, R.S. (eds.) ACM
-
Goodrich, M.T., Mitzenmacher, M., Ohrimenko, O., Tamassia, R.: Practical Oblivious Storage. In: Bertino, E., Sandhu, R.S. (eds.) CODASPY, pp. 13-24. ACM (2012)
-
(2012)
CODASPY
, pp. 13-24
-
-
Goodrich, M.T.1
Mitzenmacher, M.2
Ohrimenko, O.3
Tamassia, R.4
-
11
-
-
84860169197
-
Privacy-Preserving Group Data Access via Stateless Oblivious RAM Simulation
-
Rabani, Y. (ed.) SIAM
-
Goodrich, M.T., Mitzenmacher, M., Ohrimenko, O., Tamassia, R.: Privacy-Preserving Group Data Access via Stateless Oblivious RAM Simulation. In: Rabani, Y. (ed.) SODA, pp. 157-167. SIAM (2012)
-
(2012)
SODA
, pp. 157-167
-
-
Goodrich, M.T.1
Mitzenmacher, M.2
Ohrimenko, O.3
Tamassia, R.4
-
12
-
-
84860181777
-
On the (In)security of Hash-based Oblivious RAM and a New Balancing Scheme
-
Randall, D. (ed.) SIAM
-
Kushilevitz, E., Lu, S., Ostrovsky, R.: On the (In)security of Hash-based Oblivious RAM and a New Balancing Scheme. In: Randall, D. (ed.) SODA, pp. 143-156. SIAM (2012)
-
(2012)
SODA
, pp. 143-156
-
-
Kushilevitz, E.1
Lu, S.2
Ostrovsky, R.3
-
13
-
-
84875090679
-
Toward Practical Private Access to Data Centers via Parallel ORAM
-
Lorch, J.R., Mickens, J.W., Parno, B., Raykova, M., Schiffman, J.: Toward Practical Private Access to Data Centers via Parallel ORAM. IACR Cryptology ePrint Archive, 2012:133 (2012)
-
(2012)
IACR Cryptology ePrint Archive
, vol.2012
, pp. 133
-
-
Lorch, J.R.1
Mickens, J.W.2
Parno, B.3
Raykova, M.4
Schiffman, J.5
-
14
-
-
84875106434
-
Distributed Oblivious RAM for Secure Two-Party Computation
-
Lu, S., Ostrovsky, R.: Distributed Oblivious RAM for Secure Two-Party Computation. IACR Cryptology ePrint Archive, 2011:384 (2011)
-
(2011)
IACR Cryptology ePrint Archive
, vol.2011
, pp. 384
-
-
Lu, S.1
Ostrovsky, R.2
-
15
-
-
33745640963
-
Cache attacks and counter-measures: The case of AES
-
DOI 10.1007/11605805-1, Topics in Cryptology - CT-RSA 2006: The Cryptographers' Track at the RSA Conference 2006, Proceedings
-
Osvik, D.A., Shamir, A., Tromer, E.: Cache Attacks and Countermeasures: The Case of AES. In: Pointcheval, D. (ed.) CT-RSA 2006. LNCS, vol. 3860, pp. 1-20. Springer, Heidelberg (2006) (Pubitemid 43971699)
-
(2006)
Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.3960 LNCS
, pp. 1-20
-
-
Osvik, D.A.1
Shamir, A.2
Tromer, E.3
-
16
-
-
77957007201
-
Oblivious RAM Revisited
-
Rabin, T. (ed.) CRYPTO 2010. Springer, Heidelberg
-
Pinkas, B., Reinman, T.: Oblivious RAM Revisited. In: Rabin, T. (ed.) CRYPTO 2010. LNCS, vol. 6223, pp. 502-519. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6223
, pp. 502-519
-
-
Pinkas, B.1
Reinman, T.2
-
17
-
-
82955173838
-
3) Worst-Case Cost
-
Lee, D.H., Wang, X. (eds.) ASIACRYPT 2011. Springer, Heidelberg
-
3) Worst-Case Cost. In: Lee, D.H., Wang, X. (eds.) ASIACRYPT 2011. LNCS, vol. 7073, pp. 197-214. Springer, Heidelberg (2011)
-
(2011)
LNCS
, vol.7073
, pp. 197-214
-
-
Shi, E.1
Chan, T.-H.H.2
Stefanov, E.3
Li, M.4
-
18
-
-
80955132243
-
Towards Practical Oblivious RAM
-
abs/1106.3652
-
Stefanov, E., Shi, E., Song, D.: Towards Practical Oblivious RAM. CoRR, abs/1106.3652 (2011)
-
(2011)
CoRR
-
-
Stefanov, E.1
Shi, E.2
Song, D.3
-
19
-
-
85180787079
-
Usable PIR
-
The Internet Society
-
Williams, P., Sion, R.: Usable PIR. In: NDSS. The Internet Society (2008)
-
(2008)
NDSS
-
-
Williams, P.1
Sion, R.2
-
20
-
-
84875099300
-
SR-ORAM: Single Round-trip Oblivious RAM
-
Industrial Track
-
Williams, P., Sion, R.: SR-ORAM: Single Round-trip Oblivious RAM. In: ACNS, Industrial Track, pp. 19-33 (2012)
-
(2012)
ACNS
, pp. 19-33
-
-
Williams, P.1
Sion, R.2
-
21
-
-
29144444415
-
Hardware Assisted Control Flow Obfuscation for Embedded Processors
-
Irwin, M.J., Zhao, W., Lavagno, L., Mahlke, S.A. (eds.) ACM
-
Zhuang, X., Zhang, T., Lee, H.-H.S., Pande, S.: Hardware Assisted Control Flow Obfuscation for Embedded Processors. In: Irwin, M.J., Zhao, W., Lavagno, L., Mahlke, S.A. (eds.) CASES, pp. 292-302. ACM (2004)
-
(2004)
CASES
, pp. 292-302
-
-
Zhuang, X.1
Zhang, T.2
Lee, H.-H.S.3
Pande, S.4
|