Keyphrases
Oblivious RAM
100%
Byzantine Agreement
41%
Latency
30%
Byzantine Fault Tolerance
28%
Proof-of-Work
24%
Communication Complexity
22%
Byzantine Broadcast
22%
State Machine Replication
21%
Secure Processors
20%
Path ORAM
18%
Memory-hard Function
18%
Communication Cost
16%
Proof-of-work Blockchains
16%
Optimal Communication
15%
Integrity Verification
15%
Learning Parity with Noise
15%
Near-optimal
13%
Controller
13%
Obfuscation
13%
Information Leakage
11%
Adversary
11%
Optimal Resilience
11%
Smart Contract
11%
Distributed Key Generation
11%
Corrupt
11%
Obliviousness
10%
Application Specific Integrated Circuits
10%
Partially Synchronous
10%
Bitcoin
10%
Tuxedo
10%
Private Information Retrieval
10%
Byzantine Reliable Broadcast
10%
Multilevel Thresholding
10%
Position-based
10%
Sparse LU Factorization
10%
Subquadratic
10%
Memory Regions
10%
Graphics Processing Unit
10%
Constant Bandwidth
10%
Cryptographic Security
10%
Recursion
10%
Locality Preserving
10%
Random Permutation
10%
Broadcast Protocol
9%
Low Latency
9%
Network Delay
9%
Threshold Signature
9%
Cumulative Memory Complexity
9%
Dynamic Participation
8%
Tight
8%
Computer Science
Byzantine Fault
31%
Communication Complexity
28%
Application Specific Integrated Circuit
26%
Blockchain
24%
Communication Cost
22%
byzantine fault tolerance
22%
State Machine
22%
random oracle model
21%
Cryptocurrency
20%
Cryptographic Primitive
20%
Fault Tolerant
19%
Access Pattern
18%
Bitcoin
17%
Integrity Verification
17%
Memory Access Pattern
16%
Reliable Broadcast
15%
Hashing
13%
Memory Bandwidth
13%
Consensus Protocol
12%
Smart Contract
12%
External Memory
12%
security level
12%
Information Leakage
12%
Security Parameter
12%
Homomorphic Encryption
12%
Key Generation
11%
Liveness
10%
Broadcast Protocol
10%
System Parameter
10%
Security Analysis
10%
Contiguous Memory
10%
Information Retrieval
10%
Compression Technique
10%
Circuit Simulation
10%
Graphics Processing Unit
10%
Random Permutation
10%
Block Size (B)
10%
Directed Acyclic Graph
9%
Secret Sharing
9%
Password
8%
Multicasting
8%
fault-tolerance
8%
Cryptography
8%
Distributed Computing
7%
Memory Controller
7%
Storage System
7%
Performance Gain
7%
Encryption Scheme
7%
Memory Access
7%
Main Memory
6%