all InfoSec news
Topic: oblivious
Distributed & Scalable Oblivious Sorting and Shuffling
1 day, 2 hours ago |
www.iacr.org
DoS-resistant Oblivious Message Retrieval from Snake-eye Resistant PKE
3 weeks, 5 days ago |
www.iacr.org
A Scalable Formal Verification Methodology for Data-Oblivious Hardware
1 month, 2 weeks ago |
arxiv.org
Batch PIR and Labeled PSI with Oblivious Ciphertext Compression
2 months, 1 week ago |
www.iacr.org
HomeRun: High-efficiency Oblivious Message Retrieval, Unrestricted
2 months, 2 weeks ago |
www.iacr.org
Fast Public-Key Silent OT and More from Constrained Naor-Reingold
2 months, 2 weeks ago |
www.iacr.org
On Tweakable Correlation Robust Hashing against Key Leakages
2 months, 2 weeks ago |
www.iacr.org
MetaDORAM: Breaking the Log-Overhead Information Theoretic Barrier
3 months, 3 weeks ago |
www.iacr.org
Distributed Protocols for Oblivious Transfer and Polynomial Evaluation
3 months, 3 weeks ago |
www.iacr.org
Lessons in Threat Detection for Insider Threats
4 months, 2 weeks ago |
www.databreachtoday.co.uk
Lessons in Threat Detection for Insider Threats
4 months, 2 weeks ago |
www.govinfosecurity.com
Lessons in Threat Detection for Insider Threats
4 months, 2 weeks ago |
www.bankinfosecurity.com
Oblivious Homomorphic Encryption
5 months, 3 weeks ago |
www.iacr.org
FutORAMa: A Concretely Efficient Hierarchical Oblivious RAM
5 months, 4 weeks ago |
www.iacr.org
Algebraic Group Model with Oblivious Sampling
6 months, 3 weeks ago |
www.iacr.org
Waffle: An Online Oblivious Datastore for Protecting Data Access Patterns
7 months, 4 weeks ago |
www.iacr.org
Oblivious: Unlocking sensitive data without compromising privacy
8 months, 3 weeks ago |
www.siliconrepublic.com
Round-Optimal Black-Box MPC in the Plain Model
8 months, 3 weeks ago |
www.iacr.org
Oblivious Accumulators
9 months, 4 weeks ago |
www.iacr.org
Oblivious Transfer from Rerandomizable PKE
9 months, 4 weeks ago |
www.iacr.org
Decoding LTFs in the Generic Group Model
10 months, 2 weeks ago |
www.iacr.org
Towards Topology-Hiding Computation from Oblivious Transfer
10 months, 2 weeks ago |
www.iacr.org
Oblivious Transfer with Constant Computational Overhead
10 months, 2 weeks ago |
www.iacr.org
Limits of Breach-Resistant and Snapshot-Oblivious RAMs
10 months, 2 weeks ago |
www.iacr.org
Statement-Oblivious Threshold Witness Encryption
11 months, 2 weeks ago |
www.iacr.org
Distributed & Scalable Oblivious Sorting and Shuffling
1 day, 2 hours ago |
www.iacr.org
Items published with this topic over the last 90 days.
Latest
Distributed & Scalable Oblivious Sorting and Shuffling
1 day, 2 hours ago |
www.iacr.org
DoS-resistant Oblivious Message Retrieval from Snake-eye Resistant PKE
3 weeks, 5 days ago |
www.iacr.org
A Scalable Formal Verification Methodology for Data-Oblivious Hardware
1 month, 2 weeks ago |
arxiv.org
Batch PIR and Labeled PSI with Oblivious Ciphertext Compression
2 months, 1 week ago |
www.iacr.org
HomeRun: High-efficiency Oblivious Message Retrieval, Unrestricted
2 months, 2 weeks ago |
www.iacr.org
Fast Public-Key Silent OT and More from Constrained Naor-Reingold
2 months, 2 weeks ago |
www.iacr.org
On Tweakable Correlation Robust Hashing against Key Leakages
2 months, 2 weeks ago |
www.iacr.org
MetaDORAM: Breaking the Log-Overhead Information Theoretic Barrier
3 months, 3 weeks ago |
www.iacr.org
Distributed Protocols for Oblivious Transfer and Polynomial Evaluation
3 months, 3 weeks ago |
www.iacr.org
Lessons in Threat Detection for Insider Threats
4 months, 2 weeks ago |
www.databreachtoday.co.uk
Lessons in Threat Detection for Insider Threats
4 months, 2 weeks ago |
www.govinfosecurity.com
Lessons in Threat Detection for Insider Threats
4 months, 2 weeks ago |
www.bankinfosecurity.com
Oblivious Homomorphic Encryption
5 months, 3 weeks ago |
www.iacr.org
FutORAMa: A Concretely Efficient Hierarchical Oblivious RAM
5 months, 4 weeks ago |
www.iacr.org
Algebraic Group Model with Oblivious Sampling
6 months, 3 weeks ago |
www.iacr.org
Waffle: An Online Oblivious Datastore for Protecting Data Access Patterns
7 months, 4 weeks ago |
www.iacr.org
Oblivious: Unlocking sensitive data without compromising privacy
8 months, 3 weeks ago |
www.siliconrepublic.com
Round-Optimal Black-Box MPC in the Plain Model
8 months, 3 weeks ago |
www.iacr.org
Oblivious Accumulators
9 months, 4 weeks ago |
www.iacr.org
Oblivious Transfer from Rerandomizable PKE
9 months, 4 weeks ago |
www.iacr.org
Decoding LTFs in the Generic Group Model
10 months, 2 weeks ago |
www.iacr.org
Towards Topology-Hiding Computation from Oblivious Transfer
10 months, 2 weeks ago |
www.iacr.org
Oblivious Transfer with Constant Computational Overhead
10 months, 2 weeks ago |
www.iacr.org
Limits of Breach-Resistant and Snapshot-Oblivious RAMs
10 months, 2 weeks ago |
www.iacr.org
Statement-Oblivious Threshold Witness Encryption
11 months, 2 weeks ago |
www.iacr.org
Topic trend (last 90 days)
Top (last 7 days)
Distributed & Scalable Oblivious Sorting and Shuffling
1 day, 2 hours ago |
www.iacr.org
Jobs in InfoSec / Cybersecurity
SOC 2 Manager, Audit and Certification
@ Deloitte | US and CA Multiple Locations
Senior InfoSec Manager - Risk and Compliance
@ Federal Reserve System | Remote - Virginia
Security Analyst
@ Fortra | Mexico
Incident Responder
@ Babcock | Chester, GB, CH1 6ER
Vulnerability, Access & Inclusion Lead
@ Monzo | Cardiff, London or Remote (UK)
Information Security Analyst
@ Unissant | MD, USA