-
1
-
-
80052013044
-
Making branching programs oblivious requires superlogarithmic overhead
-
IEEE Computer Society
-
Paul Beame and Widad Machmouchi. Making branching programs oblivious requires superlogarithmic overhead. In IEEE Conference on Computational Complexity, pages 12-22. IEEE Computer Society, 2011.
-
(2011)
IEEE Conference on Computational Complexity
, pp. 12-22
-
-
Beame, P.1
Machmouchi, W.2
-
2
-
-
79953211647
-
Making RAMs oblivious requires superlogarithmic overhead
-
Paul Beame and Widad Machmouchi. Making RAMs oblivious requires superlogarithmic overhead. ECCC, 2011.
-
(2011)
ECCC
-
-
Beame, P.1
Machmouchi, W.2
-
3
-
-
79953223285
-
Perfectly secure Oblivious RAM without random oracles
-
Yuval Ishai, editor, volume 6597 of Lecture Notes in Computer Science. Springer
-
Ivan Damgård, Sigurd Meldgaard, and Jesper Buus Nielsen. Perfectly secure Oblivious RAM without random oracles. In Yuval Ishai, editor, TCC, volume 6597 of Lecture Notes in Computer Science, pages 144-163. Springer, 2011.
-
(2011)
TCC
, pp. 144-163
-
-
Damgård, I.1
Meldgaard, S.2
Nielsen, J.B.3
-
4
-
-
78650606457
-
Privacy-preserving dataoblivious geometric algorithms for geographic data
-
New York, NY, USA. ACM
-
David Eppstein, Michael T. Goodrich, and Roberto Tamassia. Privacy-preserving dataoblivious geometric algorithms for geographic data. In Proceedings of the 18th SIGSPATIAL International Conference on Advances in Geographic Information Systems, GIS '10, pages13-22, New York, NY, USA, 2010. ACM.
-
(2010)
Proceedings of the 18th SIGSPATIAL International Conference on Advances in Geographic Information Systems, GIS '10
, pp. 13-22
-
-
Eppstein, D.1
Goodrich, M.T.2
Tamassia, R.3
-
5
-
-
0015416906
-
Real-time simulation of multihead tape units
-
October
-
Patrick C. Fischer, Albert R. Meyer, and Arnold L. Rosenberg. Real-time simulation of multihead tape units. J. ACM, 19(4):590-607, October 1972.
-
(1972)
J. ACM
, vol.19
, Issue.4
, pp. 590-607
-
-
Fischer, P.C.1
Meyer, A.R.2
Rosenberg, A.L.3
-
6
-
-
84884946400
-
Optimizing ORAM and using it efficiently for secure computation
-
Emiliano De Cristofaro and Matthew Wright editors, volume 7981 of Lecture Notes in Computer Science. Springer
-
Craig Gentry, Kenny A. Goldman, Shai Halevi, Charanjit S. Jutla, Mariana Raykova, and Daniel Wichs. Optimizing ORAM and using it efficiently for secure computation. In Emiliano De Cristofaro and Matthew Wright, editors, Privacy Enhancing Technologies, volume 7981 of Lecture Notes in Computer Science, pages 1-18. Springer, 2013.
-
(2013)
Privacy Enhancing Technologies
, pp. 1-18
-
-
Gentry, C.1
Goldman, K.A.2
Halevi, S.3
Jutla, C.S.4
Raykova, M.5
Wichs, D.6
-
7
-
-
0030149547
-
Software protection and simulation on oblivious RAMs
-
May
-
Oded Goldreich and Rafail Ostrovsky. Software protection and simulation on oblivious RAMs. J. ACM, 43(3):431-473, May 1996.
-
(1996)
J. ACM
, vol.43
, Issue.3
, pp. 431-473
-
-
Goldreich, O.1
Ostrovsky, R.2
-
8
-
-
79959681766
-
Data-oblivious external-memory algorithms for the compaction, selection, and sorting of outsourced data
-
New York, NY, USA. ACM
-
Michael T. Goodrich. Data-oblivious external-memory algorithms for the compaction, selection, and sorting of outsourced data. In Proceedings of the 23rd ACM symposium on Parallelism in algorithms and architectures, SPAA '11, pages 379-388, New York, NY, USA, 2011. ACM.
-
(2011)
Proceedings of the 23rd ACM Symposium on Parallelism in Algorithms and Architectures, SPAA '11
, pp. 379-388
-
-
Goodrich, M.T.1
-
9
-
-
0006672480
-
Two-tape simulation of multitape turing machines
-
October
-
F. C. Hennie and R. E. Stearns. Two-tape simulation of multitape turing machines. J. ACM, 13(4):533-546, October 1966.
-
(1966)
J. ACM
, vol.13
, Issue.4
, pp. 533-546
-
-
Hennie, F.C.1
Stearns, R.E.2
-
10
-
-
84860181777
-
On the (in)security of hash-based oblivious RAM and a new balancing scheme
-
Yuval Rabani, editor. SIAM
-
Eyal Kushilevitz, Steve Lu, and Rafail Ostrovsky. On the (in)security of hash-based oblivious RAM and a new balancing scheme. In Yuval Rabani, editor, SODA, pages 143-156. SIAM, 2012.
-
(2012)
SODA
, pp. 143-156
-
-
Kushilevitz, E.1
Lu, S.2
Ostrovsky, R.3
-
11
-
-
84976706686
-
New real-time simulations of multihead tape units
-
January
-
Benton L. Leong and Joel I. Seiferas. New real-time simulations of multihead tape units. J. ACM, 28(1):166-180, January 1981.
-
(1981)
J. ACM
, vol.28
, Issue.1
, pp. 166-180
-
-
Leong, B.L.1
Seiferas, J.I.2
-
12
-
-
0030676111
-
Oblivious data structures: Applications to cryptography
-
New York, NY, USA. ACM
-
Daniele Micciancio. Oblivious data structures: applications to cryptography. In Proceedings of the twenty-ninth annual ACM symposium on Theory of computing, STOC '97, pages 456-464, New York, NY, USA, 1997. ACM.
-
(1997)
Proceedings of the Twenty-ninth Annual ACM Symposium on Theory of Computing, STOC '97
, pp. 456-464
-
-
Micciancio, D.1
-
13
-
-
84866925734
-
Information-flow control for programming on encrypted data
-
IEEE, June
-
John C. Mitchell, Rahul Sharma, Deian Stefan, and Joe Zimmerman. Information-flow control for programming on encrypted data. In Computer Security Foundations Symposium (CSF), 2012 IEEE 25th, pages 45-60. IEEE, June 2012.
-
(2012)
Computer Security Foundations Symposium (CSF), 2012 IEEE 25th
, pp. 45-60
-
-
Mitchell, J.C.1
Sharma, R.2
Stefan, D.3
Zimmerman, J.4
-
14
-
-
0001048139
-
Protecting privacy using the decentralized label model
-
October
-
Andrew C. Myers and Barbara Liskov. Protecting privacy using the decentralized label model. ACM Trans. Softw. Eng. Methodol., 9(4):410-442, October 2000.
-
(2000)
ACM Trans. Softw. Eng. Methodol
, vol.9
, Issue.4
, pp. 410-442
-
-
Myers, A.C.1
Liskov, B.2
-
15
-
-
77957007201
-
Oblivious RAM revisited
-
Berlin, Heidelberg. Springer-Verlag
-
Benny Pinkas and Tzachy Reinman. Oblivious RAM revisited. In Proceedings of the 30th annual conference on Advances in cryptology, CRYPTO'10, pages 502-519, Berlin, Heidelberg, 2010. Springer-Verlag.
-
(2010)
Proceedings of the 30th Annual Conference on Advances in Cryptology, CRYPTO'10
, pp. 502-519
-
-
Pinkas, B.1
Reinman, T.2
-
16
-
-
0018456413
-
Relations among complexity measures
-
April
-
Nicholas Pippenger and Michael J. Fischer. Relations among complexity measures. J. ACM, 26(2):361-381, April 1979.
-
(1979)
J. ACM
, vol.26
, Issue.2
, pp. 361-381
-
-
Pippenger, N.1
Fischer, M.J.2
-
17
-
-
84869473022
-
Path oram: An extremely simple oblivious RAM protocol
-
Emil Stefanov, Marten van Dijk, Elaine Shi, Christopher W. Fletcher, Ling Ren, Xiangyao Yu, and Srinivas Devadas. Path oram: An extremely simple oblivious RAM protocol. IACR Cryptology ePrint Archive, 2013:280, 2013.
-
(2013)
IACR Cryptology EPrint Archive
, vol.280
, pp. 2013
-
-
Stefanov, E.1
Van Dijk, M.2
Shi, E.3
Fletcher, C.W.4
Ren, L.5
Yu, X.6
Devadas, S.7
-
18
-
-
79959864414
-
Secure data structures based on multi-party computation
-
Cyril Gavoille and Pierre Fraigniaud, editors. ACM
-
Tomas Toft. Secure data structures based on multi-party computation. In Cyril Gavoille and Pierre Fraigniaud, editors, PODC, pages 291-292. ACM, 2011.
-
(2011)
PODC
, pp. 291-292
-
-
Toft, T.1
|