نتایج جستجو برای: oram syndrome

تعداد نتایج: 622110  

Journal: :IACR Cryptology ePrint Archive 2017
Tommaso Gagliardoni Nikolaos P. Karvelas Stefan Katzenbeisser

We study the security of Oblivious Random Access Machines (ORAM) in the quantum world. First we introduce a new formal treatment of ORAMs, which is at the same time elegant and simpler than the known formalization by Goldreich and Ostrovsky. Then we define and analyze the notion of post-quantum security for ORAMs, i.e., classical ORAMs resistant against quantum adversaries. We show that merely ...

Journal: :PoPETs 2017
Joshua Gancher Adam Groce Alex Ledger

We present the idea of externally verifiable oblivious RAM (ORAM). Our goal is to allow a client and server carrying out an ORAM protocol to have disputes adjudicated by a third party, allowing for the enforcement of penalties against an unreliable or malicious server. We give a security definition that guarantees protection not only against a malicious server but also against a client making f...

2013
Martin Maas Eric Love Emil Stefanov Mohit Tiwari Elaine Shi Krste Asanović John Kubiatowicz Dawn Song

In recent work published at ACM CCS 2013 [5], we introduced Phantom, a new secure processor that obfuscates its memory access trace. To an adversary who can observe the processor’s output pins, all memory access traces are computationally indistinguishable (a property known as obliviousness). We achieve obliviousness through a cryptographic construct known as Oblivious RAM or ORAM. Existing ORA...

Journal: :Rossiyskiy Vestnik Perinatologii i Pediatrii (Russian Bulletin of Perinatology and Pediatrics) 2020

Journal: :International Journal of Applied and Basic Medical Research 2019

Journal: :Arquivos Brasileiros de Cardiologia 1999

Journal: :IACR Cryptology ePrint Archive 2013
Craig Gentry Kenny A. Goldman Shai Halevi Charanjit S. Jutla Mariana Raykova Daniel Wichs

Oblivious RAM (ORAM) allows a client to access her data on a remote server while hiding the access pattern (which locations she is accessing) from the server. Beyond its immediate utility in allowing private computation over a client’s outsourced data, ORAM also allows mutually distrustful parties to run secure-computations over their joint data with sublinear on-line complexity. In this work w...

2005
Alex J. Childs

The Mayer-Rokitansky-Küster-Hauser (MRKH) syndrome is characterized by congenital absence of the vagina, with bilateral nonfunctional rudimentary uteri. The MRKH syndrome is frequently associated with anomalies of the urinary tract, skeleton, and less frequently with cardiac defects. Ovarian function is normal, and the karyotype of the patients is always 46,XX. The authors describe the associat...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید