Back to Results
First PageMeta Content
Computing / Information / Data / Oram / CPU cache / Hash list / Hash tree / Hash function / Trie / Hashing / Error detection and correction / Cryptographic hash functions


1 Integrity Verification for Path Oblivious-RAM Ling Ren, Christopher W. Fletcher , Xiangyao Yu, Marten van Dijk and Srinivas Devadas MIT CSAIL, Cambridge, MA, USA {renling, cwfletch, yxy, marten, devadas}@mit.edu
Add to Reading List

Document Date: 2013-08-04 20:04:19


Open Document

File Size: 989,47 KB

Share Result on Facebook

City

Lincoln / New-York / /

Company

AES / Aegis / Tamper Resistant Software / V ERIFYING R ECURSIVE PATH ORAM S A / Intel Press / /

/

Facility

Cornell University Library / When building Path ORAM / Building Blocks / /

IndustryTerm

secure processor / secure processors / direct solution / na¨ıve solution / cloud computing / recently-proposed secure processor / /

Organization

MIT / Cornell University / /

Person

Srinivas Devadas / Christopher W. Fletcher / Marten van Dijk / Ling Ren / /

ProvinceOrState

Oregon / /

PublishedMedium

Cryptology ePrint Archive / /

Technology

recently-proposed secure processor / encryption / cryptography / RAM / previous secure processors / 0 B0 ORAM Interface Processor / public key / secure processor / Oblivious RAM Protocol / simulation / operating system / Operating Systems / /

URL

http /

SocialTag