2Altera Corporation,Configuration Devices for SRAMbased LUT Devices,2001-06.
3Chor B,Goldreich O,Kushilevitz E,et al.Private Information Retrieval[J].Journal of the ACM,1998,45(6):965-982.
4Kushilevitz E,Ostrovsky R.Replication is not Needed:Single Database,Computationally-private Information Retrieval[C].Proceedings of the 38th Annual Symposium on Foundations of Computer Science,Florida,USA,1997-10:364-373.
5Iliev A,Sean W.Protecting Client Privacy with Trusted Computing at the Server[J].Security & Privacy Magazine,2005,3(2):20-28.
6Smith S W,Safford D.Practical Server Privacy with Secure Coprocessors[J].IBM System Journal,2001,40(3).
7Asonov D,Freytag J C.Almost Optimal Private Information Retrieval[C].Proceedings of the 2nd Workshop on Privacy Enhancing Technologies,San Francisco,USA,2002-04.
8Asonov D,Freytag J C.Private Information Retrieval,Optimal for Users and Secure Coprocessors[R].Humboldt Univ,Tech.Rep.O:HUB-IB-159,2002.