Forwarding metamorphosis: Fast programmable match-action processing in hardware for SDN
In Software Defined Networking (SDN) the control plane is physically separate from the
forwarding plane. Control software programs the forwarding plane (eg, switches and routers) …
forwarding plane. Control software programs the forwarding plane (eg, switches and routers) …
{FlowBlaze}: Stateful Packet Processing in Hardware
Programmable NICs allow for better scalability to handle growing network workloads,
however, providing an expressive, yet simple, abstraction to program stateful network …
however, providing an expressive, yet simple, abstraction to program stateful network …
Privacy-preserving access of outsourced data via oblivious RAM simulation
Privacy-Preserving Access of Outsourced Data via Oblivious RAM Simulation Page 1
Privacy-Preserving Access of Outsourced Data via Oblivious RAM Simulation Michael T …
Privacy-Preserving Access of Outsourced Data via Oblivious RAM Simulation Michael T …
{Communication–Computation} trade-offs in {PIR}
Communication–Computation Trade-offs in PIR Page 1 This paper is included in the Proceedings
of the 30th USENIX Security Symposium. August 11–13, 2021 978-1-939133-24-3 Open access to …
of the 30th USENIX Security Symposium. August 11–13, 2021 978-1-939133-24-3 Open access to …
Real-time parallel hashing on the GPU
We demonstrate an efficient data-parallel algorithm for building large hash tables of millions
of elements in real-time. We consider two parallel algorithms for the construction: a classical …
of elements in real-time. We consider two parallel algorithms for the construction: a classical …
More robust hashing: Cuckoo hashing with a stash
Cuckoo hashing holds great potential as a high-performance hashing scheme for real
applications. Up to this point, the greatest drawback of cuckoo hashing appears to be that …
applications. Up to this point, the greatest drawback of cuckoo hashing appears to be that …
Cuckoo commitments: Registration-based encryption and key-value map commitments for large spaces
Abstract Registration-Based Encryption (RBE)[Garg et al. TCC'18] is a public-key encryption
mechanism in which users generate their own public and secret keys, and register their …
mechanism in which users generate their own public and secret keys, and register their …
Elastic cuckoo page tables: Rethinking virtual memory translation for parallelism
The unprecedented growth in the memory needs of emerging memory-intensive workloads
has made virtual memory translation a major performance bottleneck. To address this …
has made virtual memory translation a major performance bottleneck. To address this …
[KİTAP][B] Sequential and Parallel Algorithms and Data Structures
viii Preface reason for this change is that sequential processors have ceased to get
proportional performance improvements from increased circuit complexity. Although the …
proportional performance improvements from increased circuit complexity. Although the …
Tight thresholds for cuckoo hashing via XORSAT
We settle the question of tight thresholds for offline cuckoo hashing. The problem can be
stated as follows: we have n keys to be hashed into m buckets each capable of holding a …
stated as follows: we have n keys to be hashed into m buckets each capable of holding a …