Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
scientific article; zbMATH DE number 7053266 - MaRDI portal

scientific article; zbMATH DE number 7053266

From MaRDI portal
Publication:5743385

zbMath1422.68061MaRDI QIDQ5743385

Steve Lu, Eyal Kushilevitz, Rafail Ostrovsky

Publication date: 10 May 2019

Full work available at URL: https://dl.acm.org/citation.cfm?id=2095129

Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.



Related Items (28)

Perfectly secure oblivious parallel RAMSQL on structurally-encrypted databasesParameter-hiding order revealing encryptionA logarithmic lower bound for oblivious RAM (for all Parameters)Oblivious RAM with \textit{worst-case} logarithmic overheadUnnamed ItemA Secure Priority Queue; Or: On Secure Datastructures from Multiparty ComputationStronger lower bounds for online ORAMThe complexity of secure RAMsSnapshot-oblivious RAMs: sub-logarithmic efficiency for short transcripts3-party distributed ORAM from oblivious set membershipLower bound framework for differentially private and oblivious data structuresCuckoo hashing in cryptography: optimal parameters, robustness and applicationsRandom-index oblivious RAM\textsf{MacORAMa}: optimal oblivious RAM with integrityLimits of breach-resistant and snapshot-oblivious RAMsOblivious RAM with worst-case logarithmic overheadSimple and efficient two-server ORAMMore is less: perfectly secure oblivious algorithms in the multi-server settingConstant-round maliciously secure two-party computation in the RAM modelIs there an oblivious RAM lower bound for online reads?Is there an oblivious RAM lower bound for online reads?Locality-preserving oblivious RAMAlibi: a flaw in cuckoo-hashing based hierarchical ORAM schemes and a solutionStructured encryption and dynamic leakage suppressionOblivious network RAM and leveraging parallelism to achieve obliviousnessUnnamed ItemOptORAMa: optimal oblivious RAM



Cites Work


This page was built for publication: