Cryptology ePrint Archive: Report 2014/759
Available versions in chronological order
20140929:083514 (posted 29-Sep-2014 08:35:14 UTC)
How to Efficiently Evaluate RAM Programs with Malicious Security
Arash Afshar and Zhangxiang Hu and Payman Mohassel and Mike Rosulek
20140930:162122 (posted 30-Sep-2014 16:21:22 UTC)
How to Efficiently Evaluate RAM Programs with Malicious Security
Arash Afshar and Zhangxiang Hu and Payman Mohassel and Mike Rosulek
20150130:185426 (posted 30-Jan-2015 18:54:26 UTC)
How to Efficiently Evaluate RAM Programs with Malicious Security
Arash Afshar and Zhangxiang Hu and Payman Mohassel and Mike Rosulek
20150130:191311 (posted 30-Jan-2015 19:13:11 UTC)
How to Efficiently Evaluate RAM Programs with Malicious Security
Arash Afshar and Zhangxiang Hu and Payman Mohassel and Mike Rosulek
Original publication (with major differences): IACR-EUROCRYPT-2015
[
Cryptology ePrint archive
]