-
1
-
-
84958531079
-
Verifiable oblivious storage
-
Buenos Aires, Argentina
-
D. Apon, J. Katz, E. Shi, and A. Thiruvengadam. Verifiable Oblivious Storage. In Proceedings of Public-Key Cryptography, pages 131-148, Buenos Aires, Argentina, 2014.
-
(2014)
Proceedings of Public-Key Cryptography
, pp. 131-148
-
-
Apon, D.1
Katz, J.2
Shi, E.3
Thiruvengadam, A.4
-
4
-
-
84958553141
-
Scale-invariant fully homomorphic encryption over the integers
-
Springer
-
Jean-Sébastien Coron, Tancrède Lepoint, and Mehdi Tibouchi. Scale-invariant fully homomorphic encryption over the integers. In Public-Key Cryptography-PKC 2014, pages 311-328. Springer, 2014.
-
(2014)
Public-Key Cryptography-PKC 2014
, pp. 311-328
-
-
Coron, J.1
Lepoint, T.2
Tibouchi, M.3
-
5
-
-
79953223285
-
Perfectly Secure Oblivious RAM without random oracles
-
Providence, USA, March
-
I. Damgård, S. Meldgaard, and J.B. Nielsen. Perfectly Secure Oblivious RAM without Random Oracles. In Proceedings of Theory of Cryptography Conference -TCC, pages 144-163, Providence, USA, March 2011.
-
(2011)
Proceedings of Theory of Cryptography Conference -TCC
, pp. 144-163
-
-
Damgård, I.1
Meldgaard, S.2
Nielsen, J.B.3
-
6
-
-
84954120757
-
Onion ORAM: A constant bandwidth blowup oblivious RAM
-
Srinivas Devadas, Marten van Dijk, Christopher W. Fletcher, Ling Ren, Elaine Shi, and Daniel Wichs. Onion ORAM: A Constant Bandwidth Blowup Oblivious RAM. IACR Cryptology ePrint Archive, 2015:5, 2015.
-
(2015)
IACR Cryptology EPrint Archive, 2015
, vol.5
-
-
Devadas, S.1
Van Dijk, M.2
Fletcher, C.W.3
Ren, L.4
Shi, E.5
Wichs, D.6
-
7
-
-
84884946400
-
Optimizing ORAM and using it efficiently for secure computation
-
C. Gentry, K.A. Goldman, S. Halevi, C.S. Jutla, M. Raykova, and Daniel Wichs. Optimizing ORAM and Using It Efficiently for Secure Computation. In Proceedings of Privacy Enhancing Technologies, pages 1-18, 2013.
-
(2013)
Proceedings of Privacy Enhancing Technologies
, pp. 1-18
-
-
Gentry, C.1
Goldman, K.A.2
Halevi, S.3
Jutla, C.S.4
Raykova, M.5
Wichs, D.6
-
9
-
-
0030149547
-
Software protection and simulation on oblivious rams
-
May
-
O. Goldreich and R. Ostrovsky. Software protection and simulation on oblivious rams. J. ACM, 43(3):431-473, May 1996. ISSN 0004-5411. doi: 10.1145/233551.233553. URL http://doi.acm.org/10.1145/233551.233553.
-
(1996)
J ACM
, vol.43
, Issue.3
, pp. 431-473
-
-
Goldreich, O.1
Ostrovsky, R.2
-
10
-
-
79960005023
-
Privacy-preserving access of outsourced data via oblivious ram simulation
-
Zurick, Switzerland
-
M.T. Goodrich and M. Mitzenmacher. Privacy-preserving access of outsourced data via oblivious ram simulation. In Proceedings of Automata, Languages and Programming -ICALP, pages 576-587, Zurick, Switzerland, 2011.
-
(2011)
Proceedings of Automata, Languages and Programming -ICALP
, pp. 576-587
-
-
Goodrich, M.T.1
Mitzenmacher, M.2
-
11
-
-
80955131283
-
Oblivious ram simulation with efficient worst-case access overhead
-
Chicago, USA
-
M.T. Goodrich, M. Mitzenmacher, Olga Ohrimenko, and Roberto Tamassia. Oblivious ram simulation with efficient worst-case access overhead. In Proceedings of the 3rd ACM Cloud Computing Security Workshop -CCSW, pages 95-100, Chicago, USA, 2011.
-
(2011)
Proceedings of the 3rd ACM Cloud Computing Security Workshop -CCSW
, pp. 95-100
-
-
Goodrich, M.T.1
Mitzenmacher, M.2
Ohrimenko, O.3
Tamassia, R.4
-
12
-
-
84860169197
-
Privacy-preserving group data access via stateless oblivious RAM simulation
-
Kyoto, Japan
-
M.T. Goodrich, M. Mitzenmacher, O. Ohrimenko, and R. Tamassia. Privacy-preserving group data access via stateless oblivious RAM simulation. In Proceedings of the Symposium on Discrete Algorithms -SODA, pages 157-167, Kyoto, Japan, 2012.
-
(2012)
Proceedings of the Symposium on Discrete Algorithms -SODA
, pp. 157-167
-
-
Goodrich, M.T.1
Mitzenmacher, M.2
Ohrimenko, O.3
Tamassia, R.4
-
13
-
-
0031378815
-
Replication is not needed: Single database, computationally-private information retrieval
-
Miami Beach, USA
-
E. Kushilevitz and R. Ostrovsky. Replication is not Needed: Single Database, Computationally-Private Information Retrieval. In Proceedings of Foundations of Computer Science, pages 364-373, Miami Beach, USA, 1997.
-
(1997)
Proceedings of Foundations of Computer Science
, pp. 364-373
-
-
Kushilevitz, E.1
Ostrovsky, R.2
-
14
-
-
84860181777
-
On the (in)security of hash-based oblivious ram and a new balancing scheme
-
Kyoto, Japan
-
E. Kushilevitz, S. Lu, and R. Ostrovsky. On the (in)security of hash-based oblivious ram and a new balancing scheme. In Proceedings of the Symposium on Discrete Algorithms -SODA, pages 143-156, Kyoto, Japan, 2012.
-
(2012)
Proceedings of the Symposium on Discrete Algorithms -SODA
, pp. 143-156
-
-
Kushilevitz, E.1
Lu, S.2
Ostrovsky, R.3
-
15
-
-
33645970169
-
An oblivious transfer protocol with log-squared communication
-
Singapore
-
H. Lipmaa. An Oblivious Transfer Protocol with Log-Squared Communication. In Proceedings of Information Security Conference, pages 314-328, Singapore, 2005.
-
(2005)
Proceedings of Information Security Conference
, pp. 314-328
-
-
Lipmaa, H.1
-
18
-
-
84954126349
-
Recursive trees for practical ORAM
-
Philadelphia, USA
-
T. Moataz, E.-O. Blass, and G. Noubir. Recursive Trees for Practical ORAM. In Proceedings of Privacy Enhancing Technologies Symposium, pages 115-134, Philadelphia, USA, 2015.
-
(2015)
Proceedings of Privacy Enhancing Technologies Symposium
, pp. 115-134
-
-
Moataz, T.1
Blass, E.-O.2
Noubir, G.3
-
19
-
-
84949946719
-
Resizable tree-based oblivious RAM
-
San Juan, Puerto Rico
-
T. Moataz, T. Mayberry, E.-O. Blass, and A.H. Chan. Resizable Tree-Based Oblivious RAM. In Proceedings of Financial Cryptography and Data Security, pages 147-167, San Juan, Puerto Rico, 2015. ISBN 978-3-662-47853-0.
-
(2015)
Proceedings of Financial Cryptography and Data Security
, pp. 147-167
-
-
Moataz, T.1
Mayberry, T.2
Blass, E.-O.3
Chan, A.H.4
-
23
-
-
84970911306
-
Constants count: Practical improvements to oblivious RAM
-
L. Ren, C.W. Fletcher, A. Kwon, E. Stefanov, E. Shi, M. van Dijk, and S. Devadas. Constants Count: Practical Improvements to Oblivious RAM, 2014. IACR Cryptology ePrint Archive 997.
-
(2014)
IACR Cryptology EPrint Archive
, pp. 997
-
-
Ren, L.1
Fletcher, C.W.2
Kwon, A.3
Stefanov, E.4
Shi, E.5
Van Dijk, M.6
Devadas, S.7
-
24
-
-
84983503986
-
-
RightScale. State of the cloud report, 2015. URL http://assets.rightscale.com/uploads/pdfs/RightScale-2015-State-of-the-Cloud-Report.pdf.
-
(2015)
State of the Cloud Report
-
-
RightScale1
-
25
-
-
82955173838
-
Oblivious RAM with O(log3(N)) worst-case cost
-
Seoul, South Korea
-
E. Shi, T.-H.H. Chan, E. Stefanov, and M. Li. Oblivious RAM with O(log3(N)) Worst-Case Cost. In Proceedings of Advances in Cryptology - ASIACRYPT, pages 197-214, Seoul, South Korea, 2011. ISBN 978-3-642-25384-3.
-
(2011)
Proceedings of Advances in Cryptology - ASIACRYPT
, pp. 197-214
-
-
Shi, E.1
Chan, T.-H.H.2
Stefanov, E.3
Li, M.4
-
26
-
-
85180805635
-
Towards practical oblivious ram
-
San Diego, USA,. The Internet Society
-
E. Stefanov, E. Shi, and D.X. Song. Towards practical oblivious ram. In Proceedings of the Network and Distributed System Security Symposium, San Diego, USA, 2012. The Internet Society.
-
(2012)
Proceedings of the Network and Distributed System Security Symposium
-
-
Stefanov, E.1
Shi, E.2
Song, D.X.3
-
27
-
-
84889005645
-
Path ORAM: An extremely simple oblivious RAM protocol
-
Berlin, Germany
-
E. Stefanov, M. van Dijk, E. Shi, C.W. Fletcher, L. Ren, X. Yu, and S. Devadas. Path ORAM: an extremely simple oblivious RAM protocol. In Proceedings of Conference on Computer and Communications Security, pages 299-310, Berlin, Germany, 2013. ISBN 978-1-4503-2477-9.
-
(2013)
Proceedings of Conference on Computer and Communications Security
, pp. 299-310
-
-
Stefanov, E.1
Van Dijk, M.2
Shi, E.3
Fletcher, C.W.4
Ren, L.5
Yu, X.6
Devadas, S.7
-
29
-
-
70349278621
-
Building castles out of mud: Practical access pattern privacy and correctness on untrusted storage
-
Alexandra, USA
-
P. Williams, R. Sion, and B. Carbunar. Building castles out of mud: practical access pattern privacy and correctness on untrusted storage. In ACM Conference on Computer and Communications Security, pages 139-148, Alexandra, USA, 2008.
-
(2008)
ACM Conference on Computer and Communications Security
, pp. 139-148
-
-
Williams, P.1
Sion, R.2
Carbunar, B.3
|