![Computing / Information / Data / Oram / CPU cache / Hash list / Hash tree / Hash function / Trie / Hashing / Error detection and correction / Cryptographic hash functions Computing / Information / Data / Oram / CPU cache / Hash list / Hash tree / Hash function / Trie / Hashing / Error detection and correction / Cryptographic hash functions](https://www.pdfsearch.io/img/a537eab16d9fd0541f245e7a176861a5.jpg) Date: 2013-08-04 20:04:19Computing Information Data Oram CPU cache Hash list Hash tree Hash function Trie Hashing Error detection and correction Cryptographic hash functions | | 1 Integrity Verification for Path Oblivious-RAM Ling Ren, Christopher W. Fletcher , Xiangyao Yu, Marten van Dijk and Srinivas Devadas MIT CSAIL, Cambridge, MA, USA {renling, cwfletch, yxy, marten, devadas}@mit.eduAdd to Reading ListSource URL: people.csail.mit.eduDownload Document from Source Website File Size: 989,47 KBShare Document on Facebook
|