Forwarding metamorphosis: Fast programmable match-action processing in hardware for SDN

P Bosshart, G Gibb, HS Kim, G Varghese… - ACM SIGCOMM …, 2013 - dl.acm.org
In Software Defined Networking (SDN) the control plane is physically separate from the
forwarding plane. Control software programs the forwarding plane (eg, switches and routers) …

{FlowBlaze}: Stateful Packet Processing in Hardware

S Pontarelli, R Bifulco, M Bonola, C Cascone… - … USENIX Symposium on …, 2019 - usenix.org
Programmable NICs allow for better scalability to handle growing network workloads,
however, providing an expressive, yet simple, abstraction to program stateful network …

Privacy-preserving access of outsourced data via oblivious RAM simulation

MT Goodrich, M Mitzenmacher - International Colloquium on Automata …, 2011 - Springer
Privacy-Preserving Access of Outsourced Data via Oblivious RAM Simulation Page 1
Privacy-Preserving Access of Outsourced Data via Oblivious RAM Simulation Michael T …

{Communication–Computation} trade-offs in {PIR}

A Ali, T Lepoint, S Patel, M Raykova… - 30th USENIX security …, 2021 - usenix.org
Communication–Computation Trade-offs in PIR Page 1 This paper is included in the Proceedings
of the 30th USENIX Security Symposium. August 11–13, 2021 978-1-939133-24-3 Open access to …

Real-time parallel hashing on the GPU

DA Alcantara, A Sharf, F Abbasinejad… - ACM SIGGRAPH asia …, 2009 - dl.acm.org
We demonstrate an efficient data-parallel algorithm for building large hash tables of millions
of elements in real-time. We consider two parallel algorithms for the construction: a classical …

More robust hashing: Cuckoo hashing with a stash

A Kirsch, M Mitzenmacher, U Wieder - SIAM Journal on Computing, 2010 - SIAM
Cuckoo hashing holds great potential as a high-performance hashing scheme for real
applications. Up to this point, the greatest drawback of cuckoo hashing appears to be that …

Cuckoo commitments: Registration-based encryption and key-value map commitments for large spaces

D Fiore, D Kolonelos, P Perthuis - … on the Theory and Application of …, 2023 - Springer
Abstract Registration-Based Encryption (RBE)[Garg et al. TCC'18] is a public-key encryption
mechanism in which users generate their own public and secret keys, and register their …

Elastic cuckoo page tables: Rethinking virtual memory translation for parallelism

D Skarlatos, A Kokolis, T Xu, J Torrellas - Proceedings of the Twenty …, 2020 - dl.acm.org
The unprecedented growth in the memory needs of emerging memory-intensive workloads
has made virtual memory translation a major performance bottleneck. To address this …

[KİTAP][B] Sequential and Parallel Algorithms and Data Structures

viii Preface reason for this change is that sequential processors have ceased to get
proportional performance improvements from increased circuit complexity. Although the …

Tight thresholds for cuckoo hashing via XORSAT

M Dietzfelbinger, A Goerdt, M Mitzenmacher… - … and Programming: 37th …, 2010 - Springer
We settle the question of tight thresholds for offline cuckoo hashing. The problem can be
stated as follows: we have n keys to be hashed into m buckets each capable of holding a …