International Association for Cryptologic Research

International Association
for Cryptologic Research

CryptoDB

How to Efficiently Evaluate RAM Programs with Malicious Security

Authors:
Arash Afshar
Zhangxiang Hu
Payman Mohassel
Mike Rosulek
Download:
DOI: 10.1007/978-3-662-46800-5_27 (login may be required)
URL: https://www.iacr.org/archive/eurocrypt2015/90560212/90560212.pdf
Search ePrint
Search Google
Conference: EUROCRYPT 2015
BibTeX
@inproceedings{eurocrypt-2015-27227,
  title={How to Efficiently Evaluate RAM Programs with Malicious Security},
  booktitle={EUROCRYPT (1)},
  publisher={Springer},
  pages={702-729},
  url={https://www.iacr.org/archive/eurocrypt2015/90560212/90560212.pdf},
  doi={10.1007/978-3-662-46800-5_27},
  author={Arash Afshar and Zhangxiang Hu and Payman Mohassel and Mike Rosulek},
  year=2015
}