Cryptology ePrint Archive: Report 2014/674

Available versions in chronological order


Efficient RAM and control flow in verifiable outsourced computation
Riad S. Wahby and Srinath Setty and Zuocheng Ren and Andrew J. Blumberg and Michael Walfish

Efficient RAM and control flow in verifiable outsourced computation
Riad S. Wahby and Srinath Setty and Zuocheng Ren and Andrew J. Blumberg and Michael Walfish

Efficient RAM and control flow in verifiable outsourced computation
Riad S. Wahby and Srinath Setty and Zuocheng Ren and Andrew J. Blumberg and Michael Walfish

Efficient RAM and control flow in verifiable outsourced computation
Riad S. Wahby and Srinath Setty and Max Howald and Zuocheng Ren and Andrew J. Blumberg and Michael Walfish
Original publication (with major differences): NDSS 2015

Efficient RAM and control flow in verifiable outsourced computation
Riad S. Wahby and Srinath Setty and Max Howald and Zuocheng Ren and Andrew J. Blumberg and Michael Walfish
Original publication (with minor differences): NDSS 2015

Efficient RAM and control flow in verifiable outsourced computation
Riad S. Wahby and Srinath Setty and Max Howald and Zuocheng Ren and Andrew J. Blumberg and Michael Walfish
Original publication (with minor differences): NDSS 2015

Efficient RAM and control flow in verifiable outsourced computation
Riad S. Wahby and Srinath Setty and Max Howald and Zuocheng Ren and Andrew J. Blumberg and Michael Walfish
Original publication (with minor differences): NDSS 2015

Efficient RAM and control flow in verifiable outsourced computation
Riad S. Wahby and Srinath Setty and Max Howald and Zuocheng Ren and Andrew J. Blumberg and Michael Walfish
Original publication (with minor differences): NDSS 2015

Efficient RAM and control flow in verifiable outsourced computation
Riad S. Wahby and Srinath Setty and Max Howald and Zuocheng Ren and Andrew J. Blumberg and Michael Walfish
Original publication (with minor differences): NDSS 2015


[ Cryptology ePrint archive ]