Publisher
Springer Berlin Heidelberg
Reference30 articles.
1. Cao D, Zhang M, Lu H, Ye X, Fan D, Che Y, Wang R (2021) Streamline ring ORAM accesses through spatial and temporal optimization. In: 2021 IEEE International Symposium on High-Performance Computer Architecture (HPCA). IEEE, pp 14–25
2. Che Y, Hong Y, Wang R (2019) Imbalance-aware scheduler for fast and secure ring oram data retrieval. In: 2019 IEEE 37th International Conference on Computer Design (ICCD). IEEE, pp 604–612
3. Chen H, Chillotti I, Ren L (2019) Onion ring ORAM: efficient constant bandwidth oblivious RAM from (leveled) TFHE. In: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, pp 345–360
4. Darais D, Liu C, Sweet I, Hicks M (2017) A language for probabilistically oblivious computation. CoRR abs/1711.09305, http://arxiv.org/abs/1711.09305, 1711.09305
5. Dautrich JL Jr, Stefanov E, Shi E (2014) Burst ORAM: minimizing ORAM response times for bursty access patterns. In: USENIX Security Symposium, USENIX Association, pp 749–764