Author of the publication

Ring ORAM: Closing the Gap Between Small and Large Client Storage Oblivious RAM.

, , , , , , and . IACR Cryptology ePrint Archive, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

MIT Emergency-Vent: An Automated Resuscitator Bag for the COVID-19 Crisis., , , , , , , , , and 8 other author(s). EMBC, page 4998-5004. IEEE, (2021)DynaFlow: An Efficient Website Fingerprinting Defense Based on Dynamically-Adjusting Flows., , , and . WPES@CCS, page 109-113. ACM, (2018)XRD: Scalable Messaging System with Cryptographic Privacy., , and . CoRR, (2019)Enhancing Oblivious RAM Performance Using Dynamic Prefetching., , , , , and . IACR Cryptology ePrint Archive, (2014)Unified Oblivious-RAM: Improving Recursive ORAM with Locality and Pseudorandomness., , , , , and . IACR Cryptology ePrint Archive, (2014)SpaceMint: A Cryptocurrency Based on Proofs of Space., , , , , and . Financial Cryptography, volume 10957 of Lecture Notes in Computer Science, page 480-499. Springer, (2018)PrORAM: dynamic prefetcher for oblivious RAM., , , , , , and . ISCA, page 616-628. ACM, (2015)A Low-Latency, Low-Area Hardware Oblivious RAM Controller., , , , , , and . FCCM, page 215-222. IEEE Computer Society, (2015)A Novel Actuated Tether Design for Rescue Robots using Hydraulic Transients., , and . ICRA, page 3482-3487. IEEE, (2004)Constants Count: Practical Improvements to Oblivious RAM., , , , , , and . USENIX Security Symposium, page 415-430. USENIX Association, (2015)