January 24, 2026
Oblivious Computing
Browse posts by tag
January 24, 2026
Oblivious Computing: Privacy Through Approximation
January 24, 2026
Private Information Retrieval and Systems
January 24, 2026
Regular Types in the Bernoulli Model: When Equality Isn't Equal
January 24, 2026
Statistical Foundations and Empirical Validation
January 24, 2026
Two-Level Threshold Structures for Approximate Membership Testing
October 15, 2025
What I Learned by Analyzing My Own Research as Data
I asked an AI to analyze 140+ repos and 50+ papers as a dataset. The unifying thesis it found: compositional abstractions for computing under ignorance.
October 14, 2025
Bernoulli Types: A Foundation for Approximate and Oblivious Computing
A unified type-theoretic foundation for probabilistic data structures, approximate computing, and oblivious computation with information-theoretic privacy guarantees.
October 14, 2025
Cipher Maps: A Unified Framework for Oblivious Function Approximation Through Algebraic Structures and Bernoulli Models
October 14, 2025
Cipher Maps: Category Theory Meets Oblivious Computing
Formalizing oblivious computing through cipher maps and algebraic cipher types, using category theory for functorial composition of privacy-preserving transformations.
October 14, 2025
Encrypted Search and Oblivious Types
Oblivious types give encrypted search information-theoretic privacy against access pattern leakage. No ORAM, no computational hardness assumptions. Here's how.
October 14, 2025
Encrypted Search with Oblivious Bernoulli Types: Information-Theoretic Privacy through Controlled Approximation
October 14, 2025
Maximizing Confidentiality in Encrypted Search Through Entropy Optimization
October 7, 2025
Algebraic Cipher Types: A Functorial Framework for Secure Computation
October 1, 2025
Apertures: Coordinated Partial Evaluation for Distributed Computation
January 1, 2024
Estimating Confidentiality of Encrypted Search Systems: A Probabilistic Framework
January 1, 2022
Boolean Algebra over Trapdoor Sets: A Practical Framework for Privacy-Preserving Set Operations with Probabilistic Guarantees
April 1, 2021
Time Series Analysis of Confidentiality Degradation in Encrypted Search Systems
November 2, 2016
Estimating How Confidential Encrypted Searches Are Using Moving Average Bootstrap Method
May 1, 2015