-
1
-
-
80955149556
-
-
Manuscript
-
BONEH, D., MAZIERES, D., AND POPA, R. A. Remote oblivious storage: Making oblivious RAM practical. Manuscript, http://dspace.mit.edu/bitstream/handle/1721.1/62006/MIT-CSAIL-TR-2011-018. pdf, 2011.
-
(2011)
Remote Oblivious Storage: Making Oblivious RAM Practical
-
-
Boneh, D.1
Mazieres, D.2
Popa, R.A.3
-
2
-
-
82955204091
-
Perfectly secure oblivious RAM without random oracles
-
DAMGÅRD, I., MELDGAARD, S., AND NIELSEN, J. B. Perfectly secure oblivious RAM without random oracles. In TCC (2011).
-
(2011)
TCC
-
-
Damgård, I.1
Meldgaard, S.2
Nielsen, J.B.3
-
3
-
-
84937774864
-
Burst oram: Minimizing oram response times for bursty access patterns
-
DAUTRICH, J., STEFANOV, E., AND SHI, E. Burst oram: Minimizing oram response times for bursty access patterns. In USENIX (2014).
-
(2014)
USENIX
-
-
Dautrich, J.1
Stefanov, E.2
Shi, E.3
-
4
-
-
84954120757
-
Onion oram: A constant bandwidth blowup oblivious ram
-
DEVADAS, S., VAN DIJK, M., FLETCHER, C. W., REN, L., SHI, E., AND WICHS, D. Onion oram: A constant bandwidth blowup oblivious ram. Cryptology ePrint Archive, 2015. http://eprint.iacr.org/2015/005.
-
(2015)
Cryptology ePrint Archive
-
-
Devadas, S.1
Van Dijk, M.2
Fletcher, C.W.3
Ren, L.4
Shi, E.5
Wichs, D.6
-
5
-
-
84939193220
-
Freecursive oram: [nearly] free recursion and integrity verification for position-based oblivious ram
-
FLETCHER, C., REN, L., KWON, A., VAN DIJK, M., AND DEVADAS, S. Freecursive oram: [nearly] free recursion and integrity verification for position-based oblivious ram. In ASPLOS (2015).
-
(2015)
ASPLOS
-
-
Fletcher, C.1
Ren, L.2
Kwon, A.3
Van Dijk, M.4
Devadas, S.5
-
6
-
-
84943407214
-
A low-latency, low-area hardware oblivious ram controller
-
FLETCHER, C., REN, L., KWON, A., VAN DIJK, M., STEFANOV, E., SERPANOS, D., AND DEVADAS, S. A low-latency, low-area hardware oblivious ram controller. In FCCM (2015).
-
(2015)
FCCM
-
-
Fletcher, C.1
Ren, L.2
Kwon, A.3
Van Dijk, M.4
Stefanov, E.5
Serpanos, D.6
Devadas, S.7
-
7
-
-
84904012684
-
Suppressing the oblivious ram timing channel while making information leakage and program efficiency trade-offs
-
FLETCHER, C., REN, L., YU, X., VAN DIJK, M., KHAN, O., AND DEVADAS, S. Suppressing the oblivious ram timing channel while making information leakage and program efficiency trade-offs. In HPCA (2014).
-
(2014)
HPCA
-
-
Fletcher, C.1
Ren, L.2
Yu, X.3
Van Dijk, M.4
Khan, O.5
Devadas, S.6
-
8
-
-
84881225045
-
Secure processor architecture for encrypted computation on untrusted programs
-
FLETCHER, C., VAN DIJK, M., AND DEVADAS, S. Secure Processor Architecture for Encrypted Computation on Untrusted Programs. In STC (2012).
-
(2012)
STC
-
-
Fletcher, C.1
Van Dijk, M.2
Devadas, S.3
-
9
-
-
84907816512
-
Optimizing oram and using it efficiently for secure computation
-
GENTRY, C., GOLDMAN, K. A., HALEVI, S., JUTLA, C. S., RAYKOVA, M., AND WICHS, D. Optimizing oram and using it efficiently for secure computation. In PET (2013).
-
(2013)
PET
-
-
Gentry, C.1
Goldman, K.A.2
Halevi, S.3
Jutla, C.S.4
Raykova, M.5
Wichs, D.6
-
10
-
-
0023547498
-
Towards a theory of software protection and simulation on oblivious rams
-
GOLDREICH, O. Towards a theory of software protection and simulation on oblivious rams. In STOC (1987).
-
(1987)
STOC
-
-
Goldreich, O.1
-
11
-
-
0030149547
-
Software protection and simulation on oblivious rams
-
GOLDREICH, O., AND OSTROVSKY, R. Software protection and simulation on oblivious rams. In J. ACM (1996).
-
(1996)
J. ACM
-
-
Goldreich, O.1
Ostrovsky, R.2
-
12
-
-
84881228714
-
Privacy-preserving access of outsourced data via oblivious ram simulation
-
GOODRICH, M. T., AND MITZENMACHER, M. Privacy-preserving access of outsourced data via oblivious ram simulation. In ICALP (2011).
-
(2011)
ICALP
-
-
Goodrich, M.T.1
Mitzenmacher, M.2
-
13
-
-
84860169197
-
Privacy-preserving group data access via stateless oblivious RAM simulation
-
GOODRICH, M. T., MITZENMACHER, M., OHRIMENKO, O., AND TAMASSIA, R. Privacy-preserving group data access via stateless oblivious RAM simulation. In SODA (2012).
-
(2012)
SODA
-
-
Goodrich, M.T.1
Mitzenmacher, M.2
Ohrimenko, O.3
Tamassia, R.4
-
14
-
-
85179556059
-
Access pattern disclosure on searchable encryption: Ramification, attack and mitigation
-
ISLAM, M., KUZU, M., AND KANTARCIOGLU, M. Access pattern disclosure on searchable encryption: Ramification, attack and mitigation. In NDSS (2012).
-
(2012)
NDSS
-
-
Islam, M.1
Kuzu, M.2
Kantarcioglu, M.3
-
15
-
-
84860181777
-
On the (in) security of hash-based oblivious ram and a new balancing scheme
-
KUSHILEVITZ, E., LU, S., AND OSTROVSKY, R. On the (in) security of hash-based oblivious ram and a new balancing scheme. In SODA (2012).
-
(2012)
SODA
-
-
Kushilevitz, E.1
Lu, S.2
Ostrovsky, R.3
-
16
-
-
84939198646
-
Ghostrider: A hardware-software system for memory trace oblivious computation
-
LIU, C., HARRIS, A., MAAS, M., HICKS, M., TIWARI, M., AND SHI, E. Ghostrider: A hardware-software system for memory trace oblivious computation. In ASPLOS (2015).
-
(2015)
ASPLOS
-
-
Liu, C.1
Harris, A.2
Maas, M.3
Hicks, M.4
Tiwari, M.5
Shi, E.6
-
17
-
-
84890416103
-
Shroud: Ensuring private access to large-scale data in the data center
-
LORCH, J. R., PARNO, B., MICKENS, J. W., RAYKOVA, M., AND SCHIFFMAN, J. Shroud: Ensuring private access to large-scale data in the data center. In FAST (2013).
-
(2013)
FAST
-
-
Lorch, J.R.1
Parno, B.2
Mickens, J.W.3
Raykova, M.4
Schiffman, J.5
-
18
-
-
84889002819
-
Phantom: Practical oblivious computation in a secure processor
-
MAAS, M., LOVE, E., STEFANOV, E., TIWARI, M., SHI, E., ASANOVIC, K., KUBIATOWICZ, J., AND SONG, D. Phantom: Practical oblivious computation in a secure processor. In CCS (2013).
-
(2013)
CCS
-
-
Maas, M.1
Love, E.2
Stefanov, E.3
Tiwari, M.4
Shi, E.5
Asanovic, K.6
Kubiatowicz, J.7
Song, D.8
-
19
-
-
85091187696
-
Efficient private file retrieval by combining oram and pir
-
MAYBERRY, T., BLASS, E.-O., AND CHAN, A. H. Efficient private file retrieval by combining oram and pir. In NDSS (2014).
-
(2014)
NDSS
-
-
Mayberry, T.1
Blass, E.-O.2
Chan, A.H.3
-
20
-
-
82955198779
-
Efficient computation on oblivious rams
-
OSTROVSKY, R. Efficient computation on oblivious rams. In STOC (1990).
-
(1990)
STOC
-
-
Ostrovsky, R.1
-
21
-
-
84899079157
-
Private information storage (extended abstract)
-
OSTROVSKY, R., AND SHOUP, V. Private information storage (extended abstract). In STOC (1997).
-
(1997)
STOC
-
-
Ostrovsky, R.1
Shoup, V.2
-
22
-
-
84881169695
-
Design space exploration and optimization of path oblivious ram in secure processors
-
REN, L., YU, X., FLETCHER, C., VAN DIJK, M., AND DEVADAS, S. Design space exploration and optimization of path oblivious ram in secure processors. In ISCA (2013).
-
(2013)
ISCA
-
-
Ren, L.1
Yu, X.2
Fletcher, C.3
Van Dijk, M.4
Devadas, S.5
-
24
-
-
84881250193
-
Oblivistore: High performance oblivious cloud storage
-
STEFANOV, E., AND SHI, E. Oblivistore: High performance oblivious cloud storage. In S&P (2013).
-
(2013)
S&P
-
-
Stefanov, E.1
Shi, E.2
-
25
-
-
85180805635
-
Towards practical oblivious RAM
-
STEFANOV, E., SHI, E., AND SONG, D. Towards practical oblivious RAM. In NDSS (2012).
-
(2012)
NDSS
-
-
Stefanov, E.1
Shi, E.2
Song, D.3
-
26
-
-
84869473022
-
Path oram: An extremely simple oblivious ram protocol
-
STEFANOV, E., VAN DIJK, M., SHI, E., CHAN, T.H. H., FLETCHER, C., REN, L., YU, X., AND DEVADAS, S. Path oram: An extremely simple oblivious ram protocol. Cryptology ePrint Archive, 2013. http://eprint.iacr.org/2013/280.
-
(2013)
Cryptology ePrint Archive
-
-
Stefanov, E.1
Van Dijk, M.2
Shi, E.3
Chan, T.H.H.4
Fletcher, C.5
Ren, L.6
Yu, X.7
Devadas, S.8
-
27
-
-
84889005645
-
Path oram: An extremely simple oblivious ram protocol
-
STEFANOV, E., VAN DIJK, M., SHI, E., FLETCHER, C., REN, L., YU, X., AND DEVADAS, S. Path oram: An extremely simple oblivious ram protocol. In CCS (2013).
-
(2013)
CCS
-
-
Stefanov, E.1
Van Dijk, M.2
Shi, E.3
Fletcher, C.4
Ren, L.5
Yu, X.6
Devadas, S.7
-
28
-
-
84945241357
-
Circuit oram: On tightness of the goldreich-ostrovsky lower bound
-
WANG, X. S., CHAN, T.-H. H., AND SHI, E. Circuit oram: On tightness of the goldreich-ostrovsky lower bound. Cryptology ePrint Archive, 2014. http://eprint.iacr.org/2014/672.
-
(2014)
Cryptology ePrint Archive
-
-
Wang, X.S.1
Chan, T.-H.H.2
Shi, E.3
-
29
-
-
84869381921
-
Single round access privacy on outsourced storage
-
WILLIAMS, P., AND SION, R. Single round access privacy on outsourced storage. In CCS (2012).
-
(2012)
CCS
-
-
Williams, P.1
Sion, R.2
-
30
-
-
84869453208
-
PrivateFS: A parallel oblivious file system
-
WILLIAMS, P., SION, R., AND TOMESCU, A. Privatefs: A parallel oblivious file system. In CCS (2012).
-
(2012)
CCS
-
-
Williams, P.1
Sion, R.2
Tomescu, A.3
-
31
-
-
84888985277
-
Generalized external interaction with tamper-resistant hardware with bounded information leakage
-
YU, X., FLETCHER, C. W., REN, L., VAN DIJK, M., AND DEVADAS, S. Generalized external interaction with tamper-resistant hardware with bounded information leakage. In CCSW (2013).
-
(2013)
CCSW
-
-
Yu, X.1
Fletcher, C.W.2
Ren, L.3
Van Dijk, M.4
Devadas, S.5
-
32
-
-
12844260675
-
Hide: An infrastructure for efficiently protecting information leakage on the address bus
-
ZHUANG, X., ZHANG, T., AND PANDE, S. HIDE: an infrastructure for efficiently protecting information leakage on the address bus. In ASPLOS (2004).
-
(2004)
ASPLOS
-
-
Zhuang, X.1
Zhang, T.2
Pande, S.3
|