Sciweavers

1816 search results - page 10 / 364
» Trace oblivious computation
Sort
View
EUROCRYPT
2007
Springer
14 years 1 months ago
An Efficient Protocol for Secure Two-Party Computation in the Presence of Malicious Adversaries
We show an efficient secure two-party protocol, based on Yao's construction, which provides security against malicious adversaries. Yao's original protocol is only secur...
Yehuda Lindell, Benny Pinkas
IPPS
1999
IEEE
14 years 2 months ago
Oblivious Deadlock-Free Routing in a Faulty Hypercube
A central problem in massively parallel computing is efficiently routing data between processors. This problem is complicated by two considerations. First, in any massively parall...
Jin Suk Kim, Eric Lehman, Frank Thomson Leighton
STACS
2001
Springer
14 years 2 months ago
Gathering of Asynchronous Oblivious Robots with Limited Visibility
Abstract. We consider a collection of robots which are identical (anonymous), have limited visibility of the environment, and no memory of the past (oblivious); furthermore, they a...
Paola Flocchini, Giuseppe Prencipe, Nicola Santoro...
CLUSTER
2009
IEEE
14 years 4 months ago
Oblivious routing schemes in extended generalized Fat Tree networks
—A family of oblivious routing schemes for Fat Trees and their slimmed versions is presented in this work. First, two popular oblivious routing algorithms, which we refer to as S...
Germán Rodríguez, Cyriel Minkenberg,...
ICALP
2005
Springer
14 years 3 months ago
Cache-Aware and Cache-Oblivious Adaptive Sorting
Gerth Stølting Brodal, Rolf Fagerberg, Gabr...