Login / Signup
Oblivious RAMs without Cryptographic Assumptions.
Miklós Ajtai
Published in:
Electron. Colloquium Comput. Complex. (2010)
Keyphrases
</>
smart card
field effect transistors
database
hash functions
simplifying assumptions
real time
search engine
peer to peer
security protocols
underlying assumptions
restrictive assumptions