نتایج جستجو برای: oram syndrome
تعداد نتایج: 622110 فیلتر نتایج به سال:
Oblivious RAM (ORAM) is a cryptographic primitive that hides memory access patterns to untrusted storage. ORAM may be used in secure processors for encrypted computation and/or software protection. While recursive Path ORAM is currently the most practical ORAM for secure processors, it still incurs large performance and energy overhead and is the performance bottleneck of recently proposed secu...
Holt-Oram syndrome (HOS) is a developmental disorder inherited in an autosomal-dominant pattern. Affected organs are the heart and forelimbs with upper extremity skeletal defects and congenital heart malformation. In this study we present three cases of HOS in the same family. In one of these three individuals we detected a transition of C to T (CTG-GTT, V205V) in exon 7 of the TBX5 gene. This ...
Heterozygous Tbx5(del/+) mice were generated to study the mechanisms by which TBX5 haploinsufficiency causes cardiac and forelimb abnormalities seen in Holt-Oram syndrome. Tbx5 deficiency in homozygous mice (Tbx5(del/del)) decreased expression of multiple genes and caused severe hypoplasia of posterior domains in the developing heart. Surprisingly, Tbx5 haploinsufficiency also markedly decrease...
We present Ring ORAM, a simple and low-latency ORAM construction that can be parameterized for either small or large client storage. Simply by tuning parameters, Ring ORAM matches or exceeds the performance of the best-known small and large client storage schemes and can achieve a constant factor online bandwidth overhead over insecure systems. We evaluate Ring ORAM in theory and in practice. O...
Robert Mactier, Simon Davies, Chris Dudley, Paul Harden, Colin Jones, Suren Kanagasundaram, Andrew Lewington, Donald Richardson, Maarten Taal, Peter Andrews Richard Baker, Cormac Breen, Neill Duncan, Ken Farrington, Richard Fluck, Colin Geddes, David Goldsmith, Nic Hoenich, Stephen Holt, Alan Jardine, Sarah Jenkins, Mick Kumwenda, Elizabeth Lindley, Mark MacGregor, Ashraf Mikhail, Edward Sharpl...
Cirel'son inequality states that the absolute value of the combination of quantum correlations appearing in the Clauser-Horne-Shimony-Holt (CHSH) inequality is bound by 2 square root of (2). It is shown that the correlations of two qubits belonging to a three-qubit system can violate the CHSH inequality beyond 2 square root of (2). Such a violation is not in conflict with Cirel'son's inequality...
Here we present experimental realizations of two new entanglement detection methods: a three-measurement Bell inequality inequivalent to the Clauser-Horne-Shimony-Holt inequality and a nonlinear Bell-type inequality based on the negativity measure. In addition, we provide an experimental and theoretical comparison between these new methods and several techniques already in use: the traditional ...
Oblivious RAM (ORAM) is an established technique to hide the access pattern to an untrusted storage system. With ORAM, a curious adversary cannot tell what data address the user is accessing when observing the bits moving between the user and the storage system. All existing ORAM schemes achieve obliviousness by adding redundancy to the storage system, i.e., each access is turned into multiple ...
Oblivious RAM (ORAM) is a renowned technique to hide the access paerns of an application to an untrusted memory. According to the standard ORAM denition presented by Goldreich and Ostrovsky, in order for two ORAM access sequences to be computationally indistinguishable, the lengths of these sequences must be identically distributed. An artifact of this denition is that it does not apply to m...
Modern processors, e.g., Intel SGX, allow applications to isolate secret code and data in encrypted memory regions called enclaves. While encryption effectively hides the contents of memory, the sequence of address references issued by the secret code leaks information. This is a serious problem because these leaks can easily break the confidentiality guarantees of enclaves. In this paper, we e...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید