kwonalbert / oramLinks
Recursive unified ORAM
☆15Updated 9 years ago
Alternatives and similar repositories for oram
Users that are interested in oram are comparing it to the libraries listed below
Sorting:
- A behavioural cache model for analysing the cache behaviour under side-channel attack.☆26Updated last month
- Shielded Enclaves for Cloud FPGAs☆15Updated 3 years ago
- FPGA related files for ORAM☆14Updated 9 years ago
- MIRAGE (USENIX Security 2021)☆13Updated last year
- (elastic) cuckoo hashing☆14Updated 5 years ago
- Gem5 implementation of "InvisiSpec", a defense mechanism of speculative execution attacks on cache hierarchy.☆60Updated 5 years ago
- This is an read-only mirror of the gem5 simulator. The upstream repository is stored in https://gem5.googlesource.com, code reviews shoul…☆12Updated 5 years ago
- USIMM: the Utah SImulated Memory Module☆24Updated 10 years ago
- Creating beautiful gem5 simulations☆49Updated 4 years ago
- Pythia is a set of RDMA-based remote side-channel attacks. USENIX Security 2019.☆28Updated 4 years ago
- Data-centric defense mechanism against Spectre attacks. (DAC'19)☆11Updated 5 years ago
- An FPGA-based full-stack in-storage computing system.☆38Updated 4 years ago
- ☆35Updated 4 years ago
- ☆35Updated 4 years ago
- ☆19Updated 4 years ago
- CleanupSpec (MICRO-2019)☆16Updated 4 years ago
- ☆20Updated 5 years ago
- Security Test Benchmark for Computer Architectures☆21Updated 6 months ago
- CoPHEE is a Co-processor for Partially Homomorphic Encrypted Encryption.☆32Updated last year
- Gem5 with PCI Express integrated.☆20Updated 6 years ago
- Source code for the Base-Delta-Immediate Compression Algorithm (described in the PACT 2012 paper by Pekhimenko et al. at http://users.ece…☆26Updated 10 years ago
- Hardware implementation of ORAM☆22Updated 8 years ago
- gem5-nvmain hybrid simulator supporting simulation of DRAM-NVM hybrid memory system☆78Updated 6 years ago
- Quick & Flexible Rack-Scale Computer Architecture Simulator☆46Updated last month
- ☆23Updated 5 months ago
- Streamline Covert Channel Attack (presented in ASPLOS'21)☆20Updated 4 years ago
- ☆16Updated 2 years ago
- Clio, ASPLOS'22.☆78Updated 3 years ago
- Characterizing and Modeling Non-Volatile Memory Systems [MICRO'20, TopPicks'21]☆33Updated 3 years ago
- Data oblivious ISA prototyped on the RISC-V BOOM processor.☆22Updated 3 years ago