Back to Results
First PageMeta Content
Oram / Time complexity / Hash table / Circuit / Binary tree / Theoretical computer science / Applied mathematics / Analysis of algorithms


SCORAM: Oblivious RAM for Secure Computation ∗ Xiao Shaun Wang
Add to Reading List

Document Date: 2014-09-15 11:47:32


Open Document

File Size: 603,69 KB

Share Result on Facebook

City

Scottsdale / /

Company

AES / Amazon / Goodrich / 3M / Google / Computer-Communication Networks / ORAM Construction Shi / ORAMs / Mitzenmacher / Intel / /

Country

United States / /

Currency

USD / /

/

Event

Company Expansion / Force Majeure / /

Facility

store N log(N / /

IndustryTerm

oblivious algorithms / by-product / sublinear-time secure computation protocols / eviction algorithms / oblivious algorithm / secure computation protocols / improved eviction algorithm / generic cryptographic protocols / binary search program / eviction algorithm / secure computation protocol / binary search / binary search application / tion algorithm / online cost / /

Organization

National Science Foundation / University of Maryland / Indiana University / University of Virginia / University of Hong Kong / /

Person

Dov Gordon / Kartik Nayak / Saba Eskandarian / CLP ORAM / Marten van Dijk / Jonathan Katz / Xiao Shaun Wang Yan / /

Position

author / memory garbage collector / evaluator / Garbled Circuit evaluator / General / /

ProvinceOrState

Arizona / /

Technology

tion algorithm / RAM / secure computation protocols / sublinear-time secure computation protocols / generic cryptographic protocols / Random Access / Add algorithm / secure computation protocol / SPDZ protocol / Naive oblivious algorithm / Java / separate secure computation protocols / improved eviction algorithm / eviction algorithm / 1 secure computation protocol / specific eviction algorithms / Eviction algorithms / /

URL

http /

SocialTag