Filter
Conference contribution

Search results

  • 2024

    Adaptively Secure BLS Threshold Signatures from DDH and co-CDH

    Das, S. & Ren, L., 2024, Advances in Cryptology – CRYPTO 2024 - 44th Annual International Cryptology Conference, Proceedings. Reyzin, L. & Stebila, D. (eds.). Springer, p. 251-284 34 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 14926 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Granular Synchrony

    Giridharan, N., Abraham, I., Crooks, N., Nayak, K. & Ren, L., Oct 24 2024, 38th International Symposium on Distributed Computing, DISC 2024. Alistarh, D. (ed.). Schloss Dagstuhl- Leibniz-Zentrum fur Informatik GmbH, Dagstuhl Publishing, 30. (Leibniz International Proceedings in Informatics, LIPIcs; vol. 319).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 2023

    On the Amortized Communication Complexity of Byzantine Broadcast

    Wan, J., Momose, A., Ren, L., Shi, E. & Xiang, Z., Jun 19 2023, PODC 2023 - Proceedings of the 2023 ACM Symposium on Principles of Distributed Computing. Association for Computing Machinery, p. 253-261 9 p. (Proceedings of the Annual ACM Symposium on Principles of Distributed Computing).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
  • On the Security of KZG Commitment for VSS

    Momose, A., Das, S. & Ren, L., Nov 15 2023, CCS 2023 - Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 2561-2575 15 p. (CCS 2023 - Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • ParBFT: Faster Asynchronous BFT Consensus with a Parallel Optimistic Path

    Dai, X., Jin, H., Zhang, B. & Ren, L., Nov 15 2023, CCS 2023 - Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 504-518 15 p. (CCS 2023 - Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Practical Asynchronous High-threshold Distributed Key Generation and Distributed Polynomial Sampling

    Das, S., Xiang, Z., Kokoris-Kogias, L. & Ren, L., 2023, 32nd USENIX Security Symposium, USENIX Security 2023. USENIX Association, p. 5359-5376 18 p. (32nd USENIX Security Symposium, USENIX Security 2023; vol. 8).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Practical Settlement Bounds for Longest-Chain Consensus

    Gaži, P., Ren, L. & Russell, A., 2023, Advances in Cryptology – CRYPTO 2023 - 43rd Annual International Cryptology Conference, CRYPTO 2023, Proceedings. Handschuh, H. & Lysyanskaya, A. (eds.). Springer, p. 107-138 32 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 14081 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Threshold Signatures from Inner Product Argument: Succinct, Weighted, and Multi-threshold

    Das, S., Nieto, J., Camacho, P., Bünz, B., Xiang, Z. & Ren, L., Nov 15 2023, CCS 2023 - Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 356-370 15 p. (CCS 2023 - Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Towards Practical Sleepy BFT

    Malkhi, D., Momose, A. & Ren, L., Nov 15 2023, CCS 2023 - Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 490-503 14 p. (CCS 2023 - Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Vectorized Batch Private Information Retrieval

    Mughees, M. H. & Ren, L., 2023, Proceedings - 44th IEEE Symposium on Security and Privacy, SP 2023. Institute of Electrical and Electronics Engineers Inc., p. 437-452 16 p. (Proceedings - IEEE Symposium on Security and Privacy; vol. 2023-May).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 2022

    Balanced Byzantine Reliable Broadcast with Near-Optimal Communication and Improved Computation

    Alhaddad, N., Das, S., Duan, S., Ren, L., Varia, M., Xiang, Z. & Zhang, H., Jul 20 2022, PODC 2022 - Proceedings of the 2022 ACM Symposium on Principles of Distributed Computing. Association for Computing Machinery, p. 399-417 19 p. (Proceedings of the Annual ACM Symposium on Principles of Distributed Computing).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Brief Announcement: Asynchronous Verifiable Information Dispersal with Near-Optimal Communication

    Alhaddad, N., Das, S., Duan, S., Ren, L., Varia, M., Xiang, Z. & Zhang, H., Jul 20 2022, PODC 2022 - Proceedings of the 2022 ACM Symposium on Principles of Distributed Computing. Association for Computing Machinery, p. 418-420 3 p. (Proceedings of the Annual ACM Symposium on Principles of Distributed Computing).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Constant Latency in Sleepy Consensus

    Momose, A. & Ren, L., Nov 7 2022, CCS 2022 - Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 2295-2308 14 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Good-Case and Bad-Case Latency of Unauthenticated Byzantine Broadcast: A Complete Categorization

    Abraham, I., Ren, L. & Xiang, Z., Feb 1 2022, 25th International Conference on Principles of Distributed Systems, OPODIS 2021. Bramas, Q., Gramoli, V., Gramoli, V. & Milani, A. (eds.). Schloss Dagstuhl- Leibniz-Zentrum fur Informatik GmbH, Dagstuhl Publishing, 5. (Leibniz International Proceedings in Informatics, LIPIcs; vol. 217).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Practical Asynchronous Distributed Key Generation

    Das, S., Yurek, T., Xiang, Z., Miller, A., Kokoris-Kogias, L. & Ren, L., 2022, Proceedings - 43rd IEEE Symposium on Security and Privacy, SP 2022. Institute of Electrical and Electronics Engineers Inc., p. 2518-2534 17 p. (Proceedings - IEEE Symposium on Security and Privacy; vol. 2022-May).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Practical Settlement Bounds for Proof-of-Work Blockchains

    Gazi, P., Ren, L. & Russell, A., Nov 7 2022, CCS 2022 - Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 1217-1230 14 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
  • Spurt: Scalable Distributed Randomness Beacon with Transparent Setup

    Das, S., Krishnan, V., Isaac, I. M. & Ren, L., 2022, Proceedings - 43rd IEEE Symposium on Security and Privacy, SP 2022. Institute of Electrical and Electronics Engineers Inc., p. 2502-2517 16 p. (Proceedings - IEEE Symposium on Security and Privacy; vol. 2022-May).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Tuxedo: Maximizing Smart Contract Computation in PoW Blockchains

    Das, S., Awathare, N., Ren, L., Ribeiro, V. J. & Bellur, U., Jun 6 2022, SIGMETRICS/PERFORMANCE 2022 - Abstract Proceedings of the 2022 ACM SIGMETRICS/IFIP PERFORMANCE Joint International Conference on Measurement and Modeling of Computer Systems. Association for Computing Machinery, p. 63-64 2 p. (SIGMETRICS/PERFORMANCE 2022 - Abstract Proceedings of the 2022 ACM SIGMETRICS/IFIP PERFORMANCE Joint International Conference on Measurement and Modeling of Computer Systems).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 2021

    Asynchronous Data Dissemination and its Applications

    Das, S., Xiang, Z. & Ren, L., Nov 12 2021, CCS 2021 - Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 2705-2721 17 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Good-case Latency of Byzantine Broadcast: A Complete Categorization

    Abraham, I., Nayak, K., Ren, L. & Xiang, Z., Jul 21 2021, PODC 2021 - Proceedings of the 2021 ACM Symposium on Principles of Distributed Computing. Association for Computing Machinery, p. 331-341 11 p. (Proceedings of the Annual ACM Symposium on Principles of Distributed Computing).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Multi-Threshold Byzantine Fault Tolerance

    Momose, A. & Ren, L., Nov 12 2021, CCS 2021 - Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 1686-1699 14 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • OnionPIR: Response Efficient Single-Server PIR

    Mughees, M. H., Chen, H. & Ren, L., Nov 12 2021, CCS 2021 - Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 2292-2306 15 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Optimal communication complexity of authenticated byzantine agreement

    Momose, A. & Ren, L., Oct 1 2021, 35th International Symposium on Distributed Computing, DISC 2021. Gilbert, S. (ed.). Schloss Dagstuhl- Leibniz-Zentrum fur Informatik GmbH, Dagstuhl Publishing, 32. (Leibniz International Proceedings in Informatics, LIPIcs; vol. 209).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Strengthened fault tolerance in byzantine fault tolerant replication

    Xiang, Z., Malkhi, D., Nayak, K. & Ren, L., Jul 2021, Proceedings - 2021 IEEE 41st International Conference on Distributed Computing Systems, ICDCS 2021. Institute of Electrical and Electronics Engineers Inc., p. 205-215 11 p. (Proceedings - International Conference on Distributed Computing Systems; vol. 2021-July).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
  • 2020

    Brief announcement: Byzantine agreement, broadcast and state machine replication with optimal good-case latency

    Abraham, I., Nayak, K., Ren, L. & Xiang, Z., Oct 1 2020, 34th International Symposium on Distributed Computing, DISC 2020. Attiya, H. (ed.). Schloss Dagstuhl- Leibniz-Zentrum fur Informatik GmbH, Dagstuhl Publishing, (Leibniz International Proceedings in Informatics, LIPIcs; vol. 179).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Bucket Oblivious Sort: An Extremely Simple Oblivious Sort

    Asharov, G., Chan, T. H. H., Nayak, K., Pass, R., Ren, L. & Shi, E., 2020, 3rd SIAM Symposium on Simplicity in Algorithms, SOSA 2020. Farach-Colton, M. & Gortz, I. L. (eds.). Society for Industrial and Applied Mathematics Publications, p. 8-14 7 p. (3rd SIAM Symposium on Simplicity in Algorithms, SOSA 2020).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Improved extension protocols for byzantine broadcast and agreement

    Nayak, K., Ren, L., Shi, E., Vaidya, N. H. & Xiang, Z., Oct 1 2020, 34th International Symposium on Distributed Computing, DISC 2020. Attiya, H. (ed.). Schloss Dagstuhl- Leibniz-Zentrum fur Informatik GmbH, Dagstuhl Publishing, (Leibniz International Proceedings in Informatics, LIPIcs; vol. 179).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • On the Optimality of Optimistic Responsiveness

    Shrestha, N., Abraham, I., Ren, L. & Nayak, K., Oct 30 2020, CCS 2020 - Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 839-857 19 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Sync HotStuff: Simple and practical synchronous state machine replication

    Abraham, I., Malkhi, D., Nayak, K., Ren, L. & Yin, M., May 2020, Proceedings - 2020 IEEE Symposium on Security and Privacy, SP 2020. Institute of Electrical and Electronics Engineers Inc., p. 106-118 13 p. 9152792. (Proceedings - IEEE Symposium on Security and Privacy; vol. 2020-May).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
  • 2019

    Breaking the Oblivious-RAM Bandwidth Wall

    Omar, H., Haider, S. K., Ren, L., Dijk, M. V. & Khan, O., Jan 16 2019, Proceedings - 2018 IEEE 36th International Conference on Computer Design, ICCD 2018. Institute of Electrical and Electronics Engineers Inc., p. 115-122 8 p. 8615676. (Proceedings - 2018 IEEE 36th International Conference on Computer Design, ICCD 2018).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Communication complexity of byzantine agreement, revisited

    Abraham, I., Chan, T. H. H., Dolev, D., Nayak, K., Pass, R., Ren, L. & Shi, E., Jul 16 2019, PODC 2019 - Proceedings of the 2019 ACM Symposium on Principles of Distributed Computing. Association for Computing Machinery, p. 317-326 10 p. (Proceedings of the Annual ACM Symposium on Principles of Distributed Computing).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
  • Flexible Byzantine fault tolerance

    Malkhi, D., Nayak, K. & Ren, L., Nov 6 2019, CCS 2019 - Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 1041-1053 13 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
  • Locality-preserving oblivious RAM

    Asharov, G., Hubert Chan, T. H., Nayak, K., Pass, R., Ren, L. & Shi, E., 2019, Advances in Cryptology – EUROCRYPT 2019 - 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. Ishai, Y. & Rijmen, V. (eds.). Springer, p. 214-243 30 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11477 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Onion ring oram: Efficient constant bandwidth oblivious RAM from (leveled) TFHE

    Chen, H., Chillotti, I. & Ren, L., Nov 6 2019, CCS 2019 - Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 345-360 16 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Synchronous Byzantine Agreement with Expected O(1) Rounds, Expected $$O(n^2)$$ Communication, and Optimal Resilience

    Abraham, I., Devadas, S., Dolev, D., Nayak, K. & Ren, L., 2019, Financial Cryptography and Data Security - 23rd International Conference, FC 2019, Revised Selected Papers. Goldberg, I. & Moore, T. (eds.). Springer, p. 320-334 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11598 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 2018

    Bandwidth-hard functions: Reductions and lower bounds

    Blocki, J., Ren, L. & Zhou, S., Oct 15 2018, CCS 2018 - Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 1820-1836 17 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Solida: A blockchain protocol based on reconfigurable Byzantine consensus

    Abraham, I., Malkhi, D., Nayak, K., Ren, L. & Spiegelman, A., Mar 1 2018, 21st International Conference on Principles of Distributed Systems, OPODIS 2017. Aspnes, J., Leitao, J., Bessani, A. & Felber, P. (eds.). Schloss Dagstuhl- Leibniz-Zentrum fur Informatik GmbH, Dagstuhl Publishing, 25. (Leibniz International Proceedings in Informatics, LIPIcs; vol. 95).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 2017

    A note on the security of equihash

    Alcock, L. & Ren, L., Nov 3 2017, CCSW 2017 - Proceedings of the 2017 Cloud Computing Security Workshop, co-located with CCS 2017. Association for Computing Machinery, p. 51-55 5 p. (CCSW 2017 - Proceedings of the 2017 Cloud Computing Security Workshop, co-located with CCS 2017).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Asymptotically tight bounds for composing ORAM with PIR

    Abraham, I., Fletcher, C. W., Nayak, K., Pinkas, B. & Ren, L., 2017, Public-Key Cryptography – PKC 2017 - 20th IACR International Conference on Practice and Theory in Public-Key Cryptography, Proceedings. Fehr, S. (ed.). Springer, p. 91-120 30 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10174 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Bandwidth Hard Functions for ASIC Resistance

    Ren, L. & Devadas, S., 2017, Theory of Cryptography - 15th International Conference, TCC 2017, Proceedings. Kalai, Y. & Reyzin, L. (eds.). Springer, p. 466-492 27 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10677 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Brief announcement: Practical synchronous byzantine consensus

    Abraham, I., Devadas, S., Nayak, K. & Ren, L., Oct 1 2017, 31st International Symposium on Distributed Computing, DISC 2017. Richa, A. W. (ed.). Schloss Dagstuhl- Leibniz-Zentrum fur Informatik GmbH, Dagstuhl Publishing, (Leibniz International Proceedings in Informatics, LIPIcs; vol. 91).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • HOP: Hardware makes Obfuscation Practical

    Nayak, K., Fletcher, C. W., Ren, L., Chandran, N., Lokam, S., Shi, E. & Goyal, V., 2017, 24th Annual Network and Distributed System Security Symposium, NDSS 2017. The Internet Society, (24th Annual Network and Distributed System Security Symposium, NDSS 2017).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • On iterative collision search for LPN and subset sum

    Devadas, S., Ren, L. & Xiao, H., 2017, Theory of Cryptography - 15th International Conference, TCC 2017, Proceedings. Kalai, Y. & Reyzin, L. (eds.). Springer, p. 729-746 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10678 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 2016

    Onion ORAM: A constant bandwidth blowup oblivious RAM

    Devadas, S., van Dijk, M., Fletcher, C. W., Ren, L., Shi, E. & Wichs, D., 2016, Theory of Cryptography - 3th International Conference, TCC 2016-A, Proceedings. Kushilevitz, E. & Malkin, T. (eds.). Springer, p. 145-174 30 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9563).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
  • Proof of space from stacked expanders

    Ren, L. & Devadas, S., 2016, Theory of Cryptography - 14th International Conference, TCC 2016-B, Proceedings. Smith, A. & Hirt, M. (eds.). Springer, p. 262-285 24 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9985 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 2015

    A low-latency, low-area hardware oblivious RAM controller

    Fletcher, C. W., Ren, L., Kwon, A., Van Dijk, M., Stefanov, E., Serpanos, D. & Devadas, S., Jul 15 2015, Proceedings - 2015 IEEE 23rd Annual International Symposium on Field-Programmable Custom Computing Machines, FCCM 2015. Institute of Electrical and Electronics Engineers Inc., p. 215-222 8 p. 7160074. (Proceedings - 2015 IEEE 23rd Annual International Symposium on Field-Programmable Custom Computing Machines, FCCM 2015).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
  • Constants count: Practical improvements to oblivious RAM

    Ren, L., Fletcher, C., Kwon, A., Stefanov, E., Shi, E., Van Dijk, M. & Devadas, S., 2015, Proceedings of the 24th USENIX Security Symposium. USENIX Association, p. 415-430 16 p. (Proceedings of the 24th USENIX Security Symposium).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Freecursive ORAM: [Nearly] free recursion and integrity verification for position-based oblivious RAM

    Fletcher, C. W., Ren, L., Kwon, A., Van Dijk, M. & Devadas, S., Mar 14 2015, ASPLOS 2015 - 20th International Conference on Architectural Support for Programming Languages and Operating Systems. Association for Computing Machinery, p. 103-116 14 p. (International Conference on Architectural Support for Programming Languages and Operating Systems - ASPLOS; vol. 2015-January).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • PrORAM: Dynamic prefetcher for oblivious RAM

    Yu, X., Haider, S. K., Ren, L., Fletcher, C., Kwon, A., Van Dijk, M. & Devadas, S., Jun 13 2015, ISCA 2015 - 42nd Annual International Symposium on Computer Architecture, Conference Proceedings. Institute of Electrical and Electronics Engineers Inc., p. 616-628 13 p. (Proceedings - International Symposium on Computer Architecture; vol. 13-17-June-2015).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 2014

    Suppressing the Oblivious RAM timing channel while making information leakage and program efficiency trade-offs

    Fletchery, C. W., Ren, L., Yu, X., Van Dijk, M., Khan, O. & Devadas, S., 2014, 20th IEEE International Symposium on High Performance Computer Architecture, HPCA 2014. IEEE Computer Society, p. 213-224 12 p. 6835932. (Proceedings - International Symposium on High-Performance Computer Architecture).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access