Publisher
Springer Nature Switzerland
Reference68 articles.
1. Ali, A., et al.: Communication-computation trade-offs in PIR. In: 30th USENIX Security (2021)
2. Angel, S., Chen, H., Laine, K., Setty, S.: PIR with compressed queries and amortized query processing. In: 2018 IEEE S &P (2018)
3. Angel, S., Setty, S.: Unobservable communication over fully untrusted infrastructure. In: 12th USENIX OSDI (2016)
4. Arbitman, Y., Naor, M., Segev, G.: De-amortized cuckoo hashing: provable worst-case performance and experimental results. In: ICALP (2009)
5. Lecture Notes in Computer Science;G Asharov,2020
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献