Oblivious

Results: 327



#Item
271Lattice-based cryptography / Homomorphic encryption / Symposium on Theory of Computing / International Cryptology Conference / Symposium on Foundations of Computer Science / Asiacrypt / Oblivious transfer / Eurocrypt / Indocrypt / Cryptography / Formal sciences / Post-quantum cryptography

Vinod Vaikuntanathan Curriculum Vitae Date of Revision:May 2, 2013 A BIOGRAPHICAL INFORMATION A.1

Add to Reading List

Source URL: people.csail.mit.edu

Language: English - Date: 2013-05-02 00:24:31
272Diffie–Hellman key exchange / Cryptography / Ciphertext indistinguishability / Advantage

Universally Composable Efficient Priced Oblivious Transfer from a Flexible Membership Encryption∗ Pratish Datta, Ratna Dutta, and Sourav Mukhopadhyay Department of Mathematics Indian Institute of Technology Kharagpur K

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-07-28 02:48:34
273Functional languages / Algebraic geometry / Field theory / Valuation / J / ATS / Trace / Software engineering / Algebra / Computer programming

Memory Trace Oblivious Program Execution Department of Computer Science Technical Report CS-TR-5020 Chang Liu, Michael Hicks, and Elaine Shi The University of Maryland, College Park, USA

Add to Reading List

Source URL: cryptome.org

Language: English - Date: 2014-08-08 16:26:32
274Ciphertext indistinguishability / Universal composability / Oblivious transfer / Common reference string model / Communications protocol / Secure multi-party computation / Cryptosystem / Cryptography / Cryptographic protocols / Public-key cryptography

A Framework for Efficient and Composable Oblivious Transfer Chris Peikert SRI International Vinod Vaikuntanathan MIT∗

Add to Reading List

Source URL: people.csail.mit.edu

Language: English - Date: 2010-02-04 10:10:06
275Type–token distinction / PP / Universal composability / Oblivious transfer / Security token / Proof of knowledge / Oracle machine / Actor model / Cryptography / Cryptographic protocols / Commitment scheme

General Statistically Secure Computation with Bounded-Resettable Hardware Tokens Nico D¨ottling∗1 , Daniel Kraschewski†2 , J¨orn M¨ uller-Quade3 and Tobias Nilges3 1

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-07-16 07:08:33
276Computer architecture / Central processing unit / Parallel Random Access Machine / NC / Computer memory / Parallel computing / Binary tree / Microarchitecture / Computer hardware / Computing / Models of computation

Oblivious Parallel RAM Elette Boyle∗ Technion Israel [removed] Kai-Min Chung

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-08-02 12:06:39
277Mathematics / Cache / Analysis of algorithms / B-tree / Computational complexity theory / Cache-oblivious algorithm / Binary search tree / Heap / CPU cache / Theoretical computer science / Binary trees / Computing

6.851: Advanced Data Structures Spring 2012 Lecture 7 — 8 March, 2012 Prof. Erik Demaine

Add to Reading List

Source URL: courses.csail.mit.edu

Language: English - Date: 2012-05-29 13:10:43
278Sorting algorithms / Bin / Merge sort / Range searching / Computational geometry / Cache-oblivious algorithm / FO / Database index / Mathematics / Computing / Theoretical computer science

6.851: Advanced Data Structures Spring 2012 Lecture 9 — March 15, 2012 Prof. Erik Demaine

Add to Reading List

Source URL: courses.csail.mit.edu

Language: English - Date: 2012-05-29 21:33:16
279CPU cache / Dynamic random-access memory / Synchronous dynamic random-access memory / Side channel attack / Microarchitecture / DIMM / CAS latency / Static random-access memory / SDRAM latency / Computer memory / Computer hardware / Computing

Suppressing the Oblivious RAM Timing Channel While Making Information Leakage and Program Efficiency Trade-offs Christopher W. Fletcher†∗, Ling Ren† , Xiangyao Yu† , Marten Van Dijk‡ , Omer Khan‡ , Srinivas D

Add to Reading List

Source URL: people.csail.mit.edu

Language: English - Date: 2014-01-23 18:47:27
280Hash table / Information science / Database index / Databases / Oram

Path ORAM: An Extremely Simple Oblivious RAM Protocol Emil Stefanov† , Marten van Dijk‡ , Elaine Shi∗ , Christopher Fletcher◦ , Ling Ren◦ , Xiangyao Yu◦ , Srinivas Devadas◦ †

Add to Reading List

Source URL: people.csail.mit.edu

Language: English - Date: 2013-09-14 19:02:00
UPDATE