Oblivious

Results: 327



#Item
231Bloom filter / Hashing / Cache algorithms / Bit array / Random walk / Sampling / Data / Cache-oblivious algorithm / CPU cache / Cache / Statistics / Computing

Rare Time Series Motif Discovery from Unbounded Streams Nurjahan Begum Eamonn Keogh

Add to Reading List

Source URL: www.vldb.org

Language: English - Date: 2014-09-10 17:59:50
232Computing / Computer memory / Cache-oblivious algorithm / Solid-state drive / Cache / Computer hardware

PBLCACHE A client side persistent block cache for the data center Vault Boston[removed]Luis Pabón - Red Hat

Add to Reading List

Source URL: events.linuxfoundation.org

Language: English - Date: 2015-03-05 14:44:13
233Communications protocol / Secure two-party computation / Oblivious transfer / Secure multi-party computation / Transmission Control Protocol / Two-phase commit protocol / Public-key cryptography / Circuit / Cryptography / Cryptographic protocols / Commitment scheme

Non-Interactive Secure Computation Based on Cut-and-Choose Arash Afshar1 , Payman Mohassel1 , Benny Pinkas2? , and Ben Riva2,3?? 1 University of Calgary

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-03-25 05:51:56
234Oblivious transfer / Ciphertext indistinguishability / Verifiable computing / Cryptography / Homomorphic encryption / RSA

Feasibility and Infeasibility of Adaptively Secure Fully Homomorphic Encryption∗ Jonathan Katz† Aishwarya Thiruvengadam‡

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-03-24 12:50:07
235Computer architecture / Database management systems / Graphics hardware / Central processing unit / MonetDB / OpenCL / Stream processing / CUDA / Parallel computing / Computing / Computer hardware / GPGPU

Hardware-Oblivious Parallelism for In-Memory Column-Stores Max Heimel Technische Universitat ¨ Berlin

Add to Reading List

Source URL: www.vldb.org

Language: English - Date: 2013-08-01 05:50:47
236Communications protocol / XTR / Transmission Control Protocol / Diffie–Hellman key exchange / Digital signature / Random oracle / Oracle machine / IP / E0 / Cryptography / Cryptographic protocols / Oblivious transfer

The Simplest Protocol for Oblivious Transfer Tung Chou1 and Claudio Orlandi2 1 Technische Universieit Eindhoven 2

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-16 06:07:01
237Group signature / Oblivious transfer / Public-key cryptography / Communications protocol / Signature / Cryptographic protocol / ElGamal signature scheme / Cryptography / Blind signature / Digital signature

Fair Blind Signatures Markus Stadler1 , Jean-Marc Piveteau2 , Jan Camenisch1 1 Institute for Theoretical Computer Science ETH Zurich

Add to Reading List

Source URL: www.ubilab.org

Language: English - Date: 2013-09-04 09:24:20
238Analysis of algorithms / Cache / Cache-oblivious algorithm / Suffix tree / Spanning tree / Planar separator theorem / Theoretical computer science / Graph theory / Mathematics

Theory Comput Syst[removed]: 269–296 DOI[removed]s00224[removed]Optimal Cache-Oblivious Mesh Layouts Michael A. Bender · Bradley C. Kuszmaul · Shang-Hua Teng · Kebin Wang

Add to Reading List

Source URL: supertech.csail.mit.edu

Language: English - Date: 2015-02-18 01:45:02
239Decisional Diffie–Hellman assumption / Paillier cryptosystem / XTR / RSA / ElGamal encryption / Cryptography / Public-key cryptography / Oblivious transfer

4-3 A Survey on Oblivious Transfer Protocols Le Trieu Phong In this paper, we survey some constructions of oblivious transfer (OT) protocols from public key encryption schemes. We begin with a simple construction of 1-o

Add to Reading List

Source URL: www.nict.go.jp

Language: English - Date: 2013-11-21 21:07:55
240ElGamal encryption / RSA / Oblivious transfer / XTR / Ciphertext / Cryptography / Public-key cryptography / Cryptographic protocols

3-6 T  oward Realizing Privacy-Preserving IP-Traceback NOJIMA Ryo The IP-traceback technology enables us to trace widely spread illegal users on Internet. However, to deploy this attractive technology, some problems hav

Add to Reading List

Source URL: www.nict.go.jp

Language: English - Date: 2012-03-11 23:15:00
UPDATE