Hardware-based cryptographic implementations utilize countermeasures to
...
We build boolean circuits of size O(nm^2) and depth O(log(n) + m
log(m))...
In this paper, we investigate the relative power of several conjectures ...
Oblivious RAM (ORAM), introduced in the context of software protection b...
We study the computational complexity of ARRIVAL, a zero-player game on
...