Cryptology ePrint Archive: Report 2014/759

Available versions in chronological order


How to Efficiently Evaluate RAM Programs with Malicious Security
Arash Afshar and Zhangxiang Hu and Payman Mohassel and Mike Rosulek

How to Efficiently Evaluate RAM Programs with Malicious Security
Arash Afshar and Zhangxiang Hu and Payman Mohassel and Mike Rosulek

How to Efficiently Evaluate RAM Programs with Malicious Security
Arash Afshar and Zhangxiang Hu and Payman Mohassel and Mike Rosulek

How to Efficiently Evaluate RAM Programs with Malicious Security
Arash Afshar and Zhangxiang Hu and Payman Mohassel and Mike Rosulek
Original publication (with major differences): IACR-EUROCRYPT-2015


[ Cryptology ePrint archive ]