Sciweavers

IACR
2016
48views Biometrics» more  IACR 2016»
10 years 1 months ago
A Memory Encryption Engine Suitable for General Purpose Processors
Cryptographic protection of memory is an essential ingredient for any technology that allows a closed computing system to run software in a trustworthy manner and handle secrets, ...
Shay Gueron
IACR
2016
49views Biometrics» more  IACR 2016»
10 years 1 months ago
Valiant's Universal Circuit is Practical
Universal circuits (UCs) can be programmed to evaluate any circuit of a given size k. They provide elegant solutions in various application scenarios, e.g. for private function eva...
Ágnes Kiss, Thomas Schneider 0003
IACR
2016
42views Biometrics» more  IACR 2016»
10 years 1 months ago
On Post-Compromise Security
In this work we study communication with a party whose secrets have already been compromised. At first sight, it may seem impossible to provide any type of security in this scena...
Katriel Cohn-Gordon, Cas Cremers, Luke Garratt
IACR
2016
40views Biometrics» more  IACR 2016»
10 years 1 months ago
MU-ORAM: Dealing with Stealthy Privacy Attacks in Multi-User Data Outsourcing Services
Outsourcing data to remote storage servers has become more and more popular, but the related security and privacy concerns have also been raised. To protect the pattern in which a...
Jinsheng Zhang, Wensheng Zhang 0001, Daji Qiao