Back to Results
First PageMeta Content
Oram / Time complexity / Hash table / Circuit / Binary tree / Theoretical computer science / Applied mathematics / Analysis of algorithms


SCORAM: Oblivious RAM for Secure Computation ∗ Xiao Shaun Wang
Add to Reading List

Document Date: 2014-09-26 10:55:17


Open Document

File Size: 602,93 KB

Share Result on Facebook

City

Scottsdale / /

Company

AES / Amazon / ORAM Construction Shi / ORAMs / Mitzenmacher / Goodrich / 3M / Google / Intel / Computer-Communication Networks / /

Country

United States / /

Currency

USD / /

/

Event

Company Expansion / Force Majeure / /

Facility

store N log(N / /

IndustryTerm

oblivious algorithms / by-product / sublinear-time secure computation protocols / secure computation protocol / eviction algorithms / oblivious algorithm / secure computation protocols / binary search / improved eviction algorithm / generic cryptographic protocols / binary search program / binary search application / eviction algorithm / online cost / /

Organization

University of Virginia / National Science Foundation / University of Maryland / University of Hong Kong / Indiana University / /

Person

Saba Eskandarian / CLP ORAM / Marten van Dijk / Dov Gordon / Kartik Nayak / Jonathan Katz / Xiao Shaun Wang Yan / /

Position

author / memory garbage collector / evaluator / Garbled Circuit evaluator / General / /

ProvinceOrState

Arizona / /

Technology

RAM / Java / secure computation protocols / separate secure computation protocols / sublinear-time secure computation protocols / generic cryptographic protocols / improved eviction algorithm / eviction algorithm / 1 secure computation protocol / Random Access / Add algorithm / secure computation protocol / SPDZ protocol / specific eviction algorithms / Naive oblivious algorithm / Eviction algorithms / /

URL

http /

SocialTag