kwonalbert / oramLinks
Recursive unified ORAM
☆14Updated 9 years ago
Alternatives and similar repositories for oram
Users that are interested in oram are comparing it to the libraries listed below
Sorting:
- ☆13Updated 10 years ago
- Shielded Enclaves for Cloud FPGAs☆15Updated 3 years ago
- (elastic) cuckoo hashing☆14Updated 5 years ago
- USIMM: the Utah SImulated Memory Module☆22Updated 10 years ago
- An FPGA-based full-stack in-storage computing system.☆37Updated 4 years ago
- ☆33Updated 4 years ago
- Simulator of a memory controller to connect DRAMSim and FlashDIMMSim into one unified memory☆17Updated last year
- Benchmark suite containing cache filtered traces for use with Ramulator. These include some of the workloads used in our SIGMETRICS 2019 …☆22Updated 4 years ago
- CasHMC: A Cycle-accurate Simulator for Hybrid Memory Cube☆22Updated 6 years ago
- A behavioural cache model for analysing the cache behaviour under side-channel attack.☆25Updated this week
- BEER determines an ECC code's parity-check matrix based on the uncorrectable errors it can cause. BEER targets Hamming codes that are use…☆19Updated 4 years ago
- Characterizing and Modeling Non-Volatile Memory Systems [MICRO'20, TopPicks'21]☆33Updated 3 years ago
- ☆19Updated 4 years ago
- Gem5 with PCI Express integrated.☆18Updated 6 years ago
- Heterogeneous simulator for DECADES Project☆32Updated last year
- gem5-nvmain hybrid simulator supporting simulation of DRAM-NVM hybrid memory system☆77Updated 5 years ago
- High Bandwidth Memory (HBM) timing model based on DRAMSim2☆42Updated 7 years ago
- ☆14Updated 2 years ago
- Networking Template Library for Vivado HLS☆28Updated 4 years ago
- Designing directory cache coherence protocols is complicated because coherence transactions are not atomic in modern multicore processors…☆16Updated 3 years ago
- Creating beautiful gem5 simulations☆49Updated 4 years ago
- Hardware implementation of ORAM☆22Updated 7 years ago
- MIRAGE (USENIX Security 2021)☆13Updated last year
- ☆20Updated 2 years ago
- Gem5 implementation of "InvisiSpec", a defense mechanism of speculative execution attacks on cache hierarchy.☆60Updated 5 years ago
- This is an read-only mirror of the gem5 simulator. The upstream repository is stored in https://gem5.googlesource.com, code reviews shoul…☆12Updated 5 years ago
- ☆20Updated 5 years ago
- Source code for the Base-Delta-Immediate Compression Algorithm (described in the PACT 2012 paper by Pekhimenko et al. at http://users.ece…☆26Updated 10 years ago
- Memory System Microbenchmarks☆63Updated 2 years ago
- ☆20Updated 7 years ago