scispace - formally typeset
O

Olga Ohrimenko

Researcher at Microsoft

Publications -  87
Citations -  2867

Olga Ohrimenko is an academic researcher from Microsoft. The author has contributed to research in topics: Computer science & Encryption. The author has an hindex of 20, co-authored 75 publications receiving 2271 citations. Previous affiliations of Olga Ohrimenko include Brown University & University of Melbourne.

Papers
More filters
Proceedings Article

Oblivious multi-party machine learning on trusted processors

TL;DR: This work proposes data-oblivious machine learning algorithms for support vector machines, matrix factorization, neural networks, decision trees, and k-means clustering and shows that their efficient implementation based on Intel Skylake processors scales up to large, realistic datasets, with overheads several orders of magnitude lower than with previous approaches.
Journal ArticleDOI

Propagation via lazy clause generation

TL;DR: This paper describes how to mimic a finite domain propagation engine, by mapping propagators into clauses in a SAT solver, and shows that the resulting system solves many finite domain problems significantly faster than other techniques.
Proceedings ArticleDOI

Privacy-preserving group data access via stateless oblivious RAM simulation

TL;DR: In this paper, the problem of providing privacy-preserving access to an outsourced honest-but-curious data repository for a group of trusted users was studied, and a method with O(log n) amortized access overhead for simulating a RAM algorithm that has a memory of size n, using a scheme that is data oblivious with very high probability.
Proceedings ArticleDOI

Forward and Backward Private Searchable Encryption from Constrained Cryptographic Primitives

TL;DR: In this paper, the notion of backward privacy for searchable encryption was introduced and several schemes achieving both forward and backward privacy, with various efficiency trade-offs, were presented, based on constrained pseudo-random functions and puncturable encryption schemes.
Proceedings Article

Strong and efficient cache side-channel protection using hardware transactional memory

TL;DR: Cloak, a new technique that uses hardware transactional memory to prevent adversarial observation of cache misses on sensitive code and data, provides strong protection against all known cache-based side-channel attacks with low performance overhead.