Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Oblivious ram

An Oblivious RAM (ORAM) simulator is a compiler that transforms algorithms in such a way that the resulting algorithms preserve the input-output… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
Abstract Oblivious RAM (ORAM) is important for applications that require hiding access patterns. Many ORAM schemes have been… Expand
Is this relevant?
2018
2018
An Oblivious RAM (ORAM) introduced by Goldreich and Ostrovsky [JACM’96] is a (possibly randomized) RAM, for which the memory… Expand
  • figure 1
  • figure 2
  • figure 3
Is this relevant?
Highly Cited
2013
Highly Cited
2013
We present Path ORAM, an extremely simple Oblivious RAM protocol with a small amount of client storage. Partly due to its… Expand
  • table 1
  • table 2
  • figure 1
  • table 3
  • figure 3
Is this relevant?
Highly Cited
2012
Highly Cited
2012
We take an important step forward in making Oblivious RAM (O-RAM) practical. We propose an O-RAM construction achieving an… Expand
  • table 1
  • table 2
  • figure 1
  • figure 3
  • figure 4
Is this relevant?
Highly Cited
2011
Highly Cited
2011
We describe schemes for the oblivious RAM simulation problem with a small logarithmic or polylogarithmic amortized increase in… Expand
Is this relevant?
Highly Cited
2011
Highly Cited
2011
Oblivious RAM is a useful primitive that allows a client to hide its data access patterns from an untrusted server in storage… Expand
  • table 1
  • figure 1
  • figure 2
  • figure 3
  • table 2
Is this relevant?
Highly Cited
2010
Highly Cited
2010
We reinvestigate the oblivious RAM concept introduced by Goldreich and Ostrovsky, which enables a client, that can store locally… Expand
  • table 1
  • figure 1
  • table 2
Is this relevant?
Highly Cited
2010
Highly Cited
2010
We present an algorithm for implementing a secure oblivious RAM where the access pattern is perfectly hidden in the information… Expand
  • figure 1
  • figure 2
  • figure 3
Is this relevant?
Highly Cited
1996
Highly Cited
1996
Software protection is one of the most important issues concerning computer practice. There exist many heuristics and ad-hoc… Expand
Is this relevant?
Highly Cited
1987
Highly Cited
1987
Software protection is one of the most important issues concerning computer practice. There exist many heuristics and ad-hoc… Expand
Is this relevant?