Author of the publication

Data Oblivious ISA Extensions for Side Channel-Resistant and High Performance Computing.

, , , and . IACR Cryptology ePrint Archive, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Path ORAM: An Extremely Simple Oblivious RAM Protocol., , , , , , , and . J. ACM, 65 (4): 18:1-18:26 (2018)Bucket ORAM: Single Online Roundtrip, Constant Bandwidth Oblivious RAM., , , , and . IACR Cryptology ePrint Archive, (2015)A low-overhead dynamic optimization framework for multicores., , , and . PACT, page 467-468. ACM, (2012)Design and Implementation of the Ascend Secure Processor., , , , and . IEEE Trans. Dependable Sec. Comput., 16 (2): 204-216 (2019)Bridging the GPGPU-FPGA efficiency gap., , , , and . FPGA, page 119-122. ACM, (2011)Morph: Flexible Acceleration for 3D CNN-Based Video Understanding., , , and . MICRO, page 933-946. IEEE Computer Society, (2018)Onion ORAM: A Constant Bandwidth Blowup Oblivious RAM., , , , , and . TCC (A2), volume 9563 of Lecture Notes in Computer Science, page 145-174. Springer, (2016)SecDir: a secure directory to defeat directory side-channel attacks., , , and . ISCA, page 332-345. ACM, (2019)SparseTrain: Leveraging Dynamic Sparsity in Training DNNs on General-Purpose SIMD Processors., , , , and . CoRR, (2019)Integrity verification for path Oblivious-RAM., , , , and . HPEC, page 1-6. IEEE, (2013)