Efficient RAM and control flow in verifiable outsourced computation

RS Wahby, S Setty, M Howald, Z Ren… - Cryptology ePrint …, 2014 - eprint.iacr.org
Recent work on proof-based verifiable computation has resulted in built systems that employ
tools from complexity theory and cryptography to address a basic problem in systems …

[PDF][PDF] Efficient RAM and Control Flow in Verifiable Outsourced Computation

RS Wahby, S Setty, Z Ren, AJ Blumberg, M Walfish - 2015 - ndss-symposium.org
Recent work on proof-based verifiable computation has resulted in built systems that employ
tools from complexity theory and cryptography to address a basic problem in systems …

[PDF][PDF] Efficient RAM and control flow in verifiable outsourced computation

RS Wahby, S Setty, Z Ren, AJ Blumberg, M Walfish - 2015 - pepper-project.org
Recent work on proof-based verifiable computation has resulted in built systems that employ
tools from complexity theory and cryptography to address a basic problem in systems …

Efficient RAM and Control Flow in Verifiable Outsourced Computation

RS Wahby, S Setty, Z Ren… - 22nd Annual Network …, 2015 - nyuscholars.nyu.edu
Recent work on proof-based verifiable computation has resulted in built systems that employ
tools from complexity theory and cryptography to address a basic problem in systems …

[PDF][PDF] Efficient RAM and control flow in verifiable outsourced computation

RS Wahby, S Setty, Z Ren, AJ Blumberg, M Walfish - 2015 - microsoft.com
Recent work on proof-based verifiable computation has resulted in built systems that employ
tools from complexity theory and cryptography to address a basic problem in systems …

[PDF][PDF] Efficient RAM and control flow in verifiable outsourced computation

RS Wahby, S Setty, Z Ren, AJ Blumberg, M Walfish - 2015 - Citeseer
Recent work on proof-based verifiable computation has resulted in built systems that employ
tools from complexity theory and cryptography to address a basic problem in systems …

[PDF][PDF] Efficient RAM and control flow in verifiable outsourced computation

RS Wahby, S Setty, Z Ren, AJ Blumberg, M Walfish - 2015 - pdfs.semanticscholar.org
Efficient RAM and control flow in verifiable outsourced computation Page 1 Efficient RAM and
control flow in verifiable outsourced computation Riad S. Wahby*, Srinath Setty†‡, Zuocheng …

[PDF][PDF] Efficient RAM and control flow in verifiable outsourced computation

RS Wahby, S Setty, Z Ren, AJ Blumberg, M Walfish - 2015 - scholar.archive.org
Recent work on proof-based verifiable computation has resulted in built systems that employ
tools from complexity theory and cryptography to address a basic problem in systems …

[PDF][PDF] Efficient RAM and control flow in verifiable outsourced computation

RS Wahby, S Setty, Z Ren, AJ Blumberg, M Walfish - 2015 - pdfs.semanticscholar.org
Efficient RAM and control flow in verifiable outsourced computation Page 1 Efficient RAM and
control flow in verifiable outsourced computation Riad S. Wahby*, Srinath Setty†‡, Zuocheng …

[PDF][PDF] Efficient RAM and control flow in verifiable outsourced computation

RS Wahby, S Setty, Z Ren, AJ Blumberg, M Walfish - 2015 - ndss-symposium.org
Efficient RAM and control flow in verifiable outsourced computation Page 1 Efficient RAM and
control flow in verifiable outsourced computation Riad S. Wahby*, Srinath Setty†‡, Zuocheng …