Sciweavers

Share
66 search results - page 14 / 14
» Secure Construction of Contingency Tables from Distributed D...
Sort
View
TCC
2016
Springer
40views Cryptology» more  TCC 2016»
3 years 9 months ago
Oblivious Parallel RAM and Applications
We initiate the study of cryptography for parallel RAM (PRAM) programs. The PRAM model captures modern multi-core architectures and cluster computing models, where several process...
Elette Boyle, Kai-Min Chung, Rafael Pass
books