-
2
-
-
78650017523
-
Predictive black-box mitigation of timing channels
-
Askarov, A., Zhang, D., and Myers, A. C. Predictive black-box mitigation of timing channels. In CCS (2010), pp. 297-307.
-
(2010)
CCS
, pp. 297-307
-
-
Askarov, A.1
Zhang, D.2
Myers, A.C.3
-
3
-
-
0001071323
-
Plongements lipschitziens dans Rn
-
Assouad, P. Plongements lipschitziens dans Rn. Bull. Soc. Math. France 111, 4 (1983), 429-448.
-
(1983)
Bull. Soc. Math. France
, vol.111
, Issue.4
, pp. 429-448
-
-
Assouad, P.1
-
4
-
-
56349136928
-
Random sampling from a search engine's index
-
Bar-Yossef, Z., and Gurevich, M. Random sampling from a search engine's index. J. ACM (2008).
-
(2008)
J. ACM
-
-
Bar-Yossef, Z.1
Gurevich, M.2
-
5
-
-
84881232126
-
Efficient garbling from a fixed-key blockcipher
-
Bellare, M., Hoang, V. T., Keelveedhi, S., and Rogaway, P. Efficient garbling from a fixed-key blockcipher. In S & P (2013).
-
(2013)
S & P
-
-
Bellare, M.1
Hoang, V.T.2
Keelveedhi, S.3
Rogaway, P.4
-
6
-
-
84892318649
-
-
Berg, M. d., Cheong, O., Kreveld, M. v., and Overmars, M.computational Geometry: Algorithms and Applications. 2008.
-
(2008)
Computational Geometry: Algorithms and Applications
-
-
Berg, M.D.1
Cheong, O.2
Kreveld, M.V.3
Overmars, M.4
-
7
-
-
84877998963
-
Data-oblivious graph algorithms for secure computation and outsourcing
-
Blanton, M., Steele, A., and Aliasgari, M. Data-oblivious graph algorithms for secure computation and outsourcing. In ASIACCS (2013).
-
(2013)
ASIACCS
-
-
Blanton, M.1
Steele, A.2
Aliasgari, M.3
-
8
-
-
46749157919
-
Strongly history-independent hashing with applications
-
Blelloch, G. E., and Golovin, D. Strongly history-independent hashing with applications. In FOCS (2007).
-
(2007)
FOCS
-
-
Blelloch, G.E.1
Golovin, D.2
-
10
-
-
0033453107
-
Nearest neighbor queries in metric spaces
-
Clarkson, K. L. Nearest neighbor queries in metric spaces. Discrete Comput. Geom. 22, 1 (1999), 63-93.
-
(1999)
Discrete Comput. Geom
, vol.22
, Issue.1
, pp. 63-93
-
-
Clarkson, K.L.1
-
11
-
-
82955204091
-
Perfectly secure oblivious RAM without random oracles
-
Damgård, I., Meldgaard, S., and Nielsen, J. B. Perfectly secure oblivious RAM without random oracles. In TCC (2011).
-
(2011)
TCC
-
-
Damgård, I.1
Meldgaard, S.2
Nielsen, J.B.3
-
12
-
-
78650606457
-
Privacy-preserving data-oblivious geometric algorithms for geographic data
-
Eppstein, D., Goodrich, M. T., and Tamassia, R. Privacy-preserving data-oblivious geometric algorithms for geographic data. In GIS (2010).
-
(2010)
GIS
-
-
Eppstein, D.1
Goodrich, M.T.2
Tamassia, R.3
-
13
-
-
84881225045
-
A secure processor architecture for encrypted computation on untrusted programs
-
Fletcher, C. W., Dijk, M. v., and Devadas, S. A secure processor architecture for encrypted computation on untrusted programs. In STC (2012).
-
(2012)
STC
-
-
Fletcher, C.W.1
Dijk, M.V.2
Devadas, S.3
-
15
-
-
84907816512
-
Optimizing ORAM and using it efficiently for secure computation
-
Gentry, C., Goldman, K. A., Halevi, S., Jutla, C. S., Raykova, M., and Wichs, D. Optimizing ORAM and using it efficiently for secure computation. In PETS (2013).
-
(2013)
PETS
-
-
Gentry, C.1
Goldman, K.A.2
Halevi, S.3
Jutla, C.S.4
Raykova, M.5
Wichs, D.6
-
16
-
-
0023547498
-
Towards a theory of software protection and simulation by oblivious RAMs
-
Goldreich, O. Towards a theory of software protection and simulation by oblivious RAMs. In STOC (1987).
-
(1987)
STOC
-
-
Goldreich, O.1
-
17
-
-
0030149547
-
Software protection and simulation on oblivious RAMs
-
Goldreich, O., and Ostrovsky, R. Software protection and simulation on oblivious RAMs. J. ACM (1996).
-
(1996)
J. ACM
-
-
Goldreich, O.1
Ostrovsky, R.2
-
18
-
-
84881228714
-
Privacy-preserving access of outsourced data via oblivious RAM simulation
-
Goodrich, M. T., and Mitzenmacher, M. Privacy-preserving access of outsourced data via oblivious RAM simulation. In ICALP (2011).
-
(2011)
ICALP
-
-
Goodrich, M.T.1
Mitzenmacher, M.2
-
19
-
-
80955131283
-
Oblivious RAM simulation with efficient worst-case access overhead
-
Goodrich, M. T., Mitzenmacher, M., Ohrimenko, O., and Tamassia, R. Oblivious RAM simulation with efficient worst-case access overhead. In CCSW (2011).
-
(2011)
CCSW
-
-
Goodrich, M.T.1
Mitzenmacher, M.2
Ohrimenko, O.3
Tamassia, R.4
-
20
-
-
84869401018
-
Practical oblivious storage
-
Goodrich, M. T., Mitzenmacher, M., Ohrimenko, O., and Tamassia, R. Practical oblivious storage. In CODASPY (2012).
-
(2012)
CODASPY
-
-
Goodrich, M.T.1
Mitzenmacher, M.2
Ohrimenko, O.3
Tamassia, R.4
-
21
-
-
84860169197
-
Privacy-preserving group data access via stateless oblivious RAM simulation
-
Goodrich, M. T., Mitzenmacher, M., Ohrimenko, O., and Tamassia, R. Privacy-preserving group data access via stateless oblivious RAM simulation. In SODA (2012).
-
(2012)
SODA
-
-
Goodrich, M.T.1
Mitzenmacher, M.2
Ohrimenko, O.3
Tamassia, R.4
-
22
-
-
84874155278
-
Data-oblivious graph drawing model and algorithms
-
abs/1209.0756
-
Goodrich, M. T., Ohrimenko, O., and Tamassia, R. Data-oblivious graph drawing model and algorithms. CoRR abs/1209.0756 (2012).
-
(2012)
CoRR
-
-
Goodrich, M.T.1
Ohrimenko, O.2
Tamassia, R.3
-
23
-
-
84869456660
-
Secure two-party computation in sublinear (amortized) time
-
Gordon, S. D., Katz, J., Kolesnikov, V., Krell, F., Malkin, T., Raykova, M., and Vahlis, Y. Secure two-party computation in sublinear (amortized) time. In CCS (2012).
-
(2012)
CCS
-
-
Gordon, S.D.1
Katz, J.2
Kolesnikov, V.3
Krell, F.4
Malkin, T.5
Raykova, M.6
Vahlis, Y.7
-
24
-
-
0344550482
-
Bounded geometries, fractals, and low-distortion embeddings
-
Gupta, A., Krauthgamer, R., and Lee, J. R. Bounded geometries, fractals, and low-distortion embeddings. In FOCS (2003), pp. 534-543.
-
(2003)
FOCS
, pp. 534-543
-
-
Gupta, A.1
Krauthgamer, R.2
Lee, J.R.3
-
25
-
-
84914127581
-
Faster secure two-party computation using garbled circuits
-
Huang, Y., Evans, D., Katz, J., and Malka, L. Faster Secure Two-Party Computation Using Garbled Circuits. In USENIX Security Symposium (2011).
-
(2011)
USENIX Security Symposium
-
-
Huang, Y.1
Evans, D.2
Katz, J.3
Malka, L.4
-
26
-
-
85179556059
-
Access pattern disclosure on searchable encryption: Ramification, attack and mitigation
-
Islam, M., Kuzu, M., and Kantarcioglu, M. Access pattern disclosure on searchable encryption: Ramification, attack and mitigation. In NDSS (2012).
-
(2012)
NDSS
-
-
Islam, M.1
Kuzu, M.2
Kantarcioglu, M.3
-
27
-
-
84910645702
-
Efficient, oblivious data structures for mpc
-
Keller, M., and Scholl, P. Efficient, oblivious data structures for mpc. Cryptology ePrint Archive, Report 2014/137, 2014. http://eprint.iacr.org/.
-
(2014)
Cryptology EPrint Archive, Report 2014/137
-
-
Keller, M.1
Scholl, P.2
-
28
-
-
84860181777
-
On the (in)security of hash-based oblivious RAM and a new balancing scheme
-
Kushilevitz, E., Lu, S., and Ostrovsky, R. On the (in)security of hash-based oblivious RAM and a new balancing scheme. In SODA (2012).
-
(2012)
SODA
-
-
Kushilevitz, E.1
Lu, S.2
Ostrovsky, R.3
-
30
-
-
84885008414
-
Memory trace oblivious program execution
-
Liu, C., Hicks, M., and Shi, E. Memory trace oblivious program execution. In CSF (2013).
-
(2013)
CSF
-
-
Liu, C.1
Hicks, M.2
Shi, E.3
-
31
-
-
84914153789
-
Automating efficient RAM-model secure computation
-
May
-
Liu, C., Huang, Y., Shi, E., Katz, J., and Hicks, M. Automating efficient RAM-model secure computation. In IEEE S & P (May 2014).
-
(2014)
IEEE S & P
-
-
Liu, C.1
Huang, Y.2
Shi, E.3
Katz, J.4
Hicks, M.5
-
32
-
-
84910593773
-
Distributed oblivious RAM for secure two-party computation
-
Lu, S., and Ostrovsky, R. Distributed oblivious RAM for secure two-party computation. In TCC (2013).
-
(2013)
TCC
-
-
Lu, S.1
Ostrovsky, R.2
-
33
-
-
84910654722
-
How to garble ram programs
-
Lu, S., and Ostrovsky, R. How to garble ram programs. In EUROCRYPT (2013).
-
(2013)
EUROCRYPT
-
-
Lu, S.1
Ostrovsky, R.2
-
34
-
-
84889002819
-
Phantom: Practical oblivious computation in a secure processor
-
Maas, M., Love, E., Stefanov, E., Tiwari, M., Shi, E., Asanovic, K., Kubiatowicz, J., and Song, D. Phantom: Practical oblivious computation in a secure processor. In CCS (2013).
-
(2013)
CCS
-
-
Maas, M.1
Love, E.2
Stefanov, E.3
Tiwari, M.4
Shi, E.5
Asanovic, K.6
Kubiatowicz, J.7
Song, D.8
-
35
-
-
0030676111
-
Oblivious data structures: Applications to cryptography
-
ACM
-
Micciancio, D. Oblivious data structures: applications to cryptography. In STOC (1997), ACM.
-
(1997)
STOC
-
-
Micciancio, D.1
-
36
-
-
84945230281
-
Data-oblivious data structures
-
Mitchell, J. C., and Zimmerman, J. Data-Oblivious Data Structures. In STACS (2014).
-
(2014)
STACS
-
-
Mitchell, J.C.1
Zimmerman, J.2
-
37
-
-
84888987660
-
Privacy-preserving matrix factorization
-
Nikolaenko, V., Ioannidis, S., Weinsberg, U., Joye, M., Taft, N., and Boneh, D. Privacy-preserving matrix factorization. In CCS (2013).
-
(2013)
CCS
-
-
Nikolaenko, V.1
Ioannidis, S.2
Weinsberg, U.3
Joye, M.4
Taft, N.5
Boneh, D.6
-
38
-
-
84899079157
-
Private information storage (extended abstract
-
Ostrovsky, R., and Shoup, V. Private information storage (extended abstract). In STOC (1997).
-
(1997)
STOC
-
-
Ostrovsky, R.1
Shoup, V.2
-
39
-
-
0018456413
-
Relations among complexity measures
-
Pippenger, N., and Fischer, M. J. Relations among complexity measures. In J. ACM (1979).
-
(1979)
J. ACM
-
-
Pippenger, N.1
Fischer, M.J.2
-
40
-
-
84910613326
-
Unified oblivious-ram: Improving recursive oram with locality and pseudorandomness
-
Ren, L., Fletcher, C., Yu, X., Kwon, A., van Dijk, M., and Devadas, S. Unified oblivious-ram: Improving recursive oram with locality and pseudorandomness. Cryptology ePrint Archive, Report 2014/205, 2014. http://eprint.iacr.org/.
-
(2014)
Cryptology EPrint Archive Report 2014/205
-
-
Ren, L.1
Fletcher, C.2
Yu, X.3
Kwon, A.4
Van Dijk, M.5
Devadas, S.6
-
41
-
-
84928147291
-
3) worst-case cost
-
Shi, E., Chan, T.-H. H., Stefanov, E., and Li, M. Oblivious RAM with O((logN)3) worst-case cost. In ASIACRYPT (2011).
-
(2011)
ASIACRYPT
-
-
Shi, E.1
Chan, T.-H.H.2
Stefanov, E.3
Li, M.4
-
43
-
-
85180805635
-
Towards practical oblivious RAM
-
Stefanov, E., Shi, E., and Song, D. Towards practical oblivious RAM. In NDSS (2012).
-
(2012)
NDSS
-
-
Stefanov, E.1
Shi, E.2
Song, D.3
-
44
-
-
84889005645
-
Path ORAM-an extremely simple oblivious ram protocol
-
Stefanov, E., van Dijk, M., Shi, E., Fletcher, C., Ren, L., Yu, X., and Devadas, S. Path ORAM-an extremely simple oblivious ram protocol. In CCS (2013).
-
(2013)
CCS
-
-
Stefanov, E.1
Van Dijk, M.2
Shi, E.3
Fletcher, C.4
Ren, L.5
Yu, X.6
Devadas, S.7
-
45
-
-
1142280988
-
Aegis: Architecture for tamper-evident and tamper-resistant processing
-
Suh, G. E., Clarke, D., Gassend, B., van Dijk, M., and Devadas, S. Aegis: architecture for tamper-evident and tamper-resistant processing. In ICS (2003).
-
(2003)
ICS
-
-
Suh, G.E.1
Clarke, D.2
Gassend, B.3
Van Dijk, M.4
Devadas, S.5
-
46
-
-
0039927533
-
Architectural support for copy and tamper resistant software
-
Thekkath, D. L. C., Mitchell, M., Lincoln, P., Boneh, D., Mitchell, J., and Horowitz, M. Architectural support for copy and tamper resistant software. SIGOPS Oper. Syst. Rev. (2000).
-
(2000)
SIGOPS Oper. Syst. Rev
-
-
Thekkath, D.L.C.1
Mitchell, M.2
Lincoln, P.3
Boneh, D.4
Mitchell, J.5
Horowitz, M.6
-
47
-
-
79959864414
-
Secure data structures based on multi-party computation
-
Toft, T. Secure data structures based on multi-party computation. In PODC (2011), pp. 291-292.
-
(2011)
PODC
, pp. 291-292
-
-
Toft, T.1
-
48
-
-
84910678637
-
Oblivious data structures
-
Wang, X. S., Nayak, K., Liu, C., Chan, T.-H. H., Shi, E., Stefanov, E., and Huang, Y. Oblivious data structures. Cryptology ePrint Archive, Report 2014/185, 2014. http://eprint.iacr.org/.
-
(2014)
Cryptology EPrint Archive Report 2014/185
-
-
Wang, X.S.1
Nayak, K.2
Liu, C.3
Chan, T.-H.H.4
Shi, E.5
Stefanov, E.6
Huang, Y.7
-
50
-
-
84881256639
-
Round-optimal access privacy on outsourced storage
-
Williams, P., and Sion, R. Round-optimal access privacy on outsourced storage. In CCS (2012).
-
(2012)
CCS
-
-
Williams, P.1
Sion, R.2
-
51
-
-
70349278621
-
Building castles out of mud: Practical access pattern privacy and correctness on untrusted storage
-
Williams, P., Sion, R., and Carbunar, B. Building castles out of mud: practical access pattern privacy and correctness on untrusted storage. In CCS (2008).
-
(2008)
CCS
-
-
Williams, P.1
Sion, R.2
Carbunar, B.3
-
52
-
-
84869453208
-
Privatefs: A parallel oblivious file system
-
Williams, P., Sion, R., and Tomescu, A. Privatefs: A parallel oblivious file system. In CCS (2012).
-
(2012)
CCS
-
-
Williams, P.1
Sion, R.2
Tomescu, A.3
-
53
-
-
84881219897
-
Circuit structures for improving efficiency of security and privacy tools
-
Zahur, S., and Evans, D. Circuit structures for improving efficiency of security and privacy tools. In S & P (2013).
-
(2013)
S & P
-
-
Zahur, S.1
Evans, D.2
-
54
-
-
80755187785
-
Predictive mitigation of timing channels in interactive systems
-
Zhang, D., Askarov, A., and Myers, A. C. Predictive mitigation of timing channels in interactive systems. In CCS (2011), pp. 563-574.
-
(2011)
CCS
, pp. 563-574
-
-
Zhang, D.1
Askarov, A.2
Myers, A.C.3
-
55
-
-
84866417462
-
Language-based control and mitigation of timing channels
-
Zhang, D., Askarov, A., and Myers, A. C. Language-based control and mitigation of timing channels. In PLDI (2012), pp. 99-110.
-
(2012)
PLDI
, pp. 99-110
-
-
Zhang, D.1
Askarov, A.2
Myers, A.C.3
-
56
-
-
12844260675
-
Hide: An infrastructure for efficiently protecting information leakage on the address bus
-
Oct
-
Zhuang, X., Zhang, T., and Pande, S. Hide: an infrastructure for efficiently protecting information leakage on the address bus. SIGARCH Comput. Archit. News 32, 5 (Oct. 2004), 72-84.
-
(2004)
SIGARCH Comput. Archit. News
, vol.32
, Issue.5
, pp. 72-84
-
-
Zhuang, X.1
Zhang, T.2
Pande, S.3
|