{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,26]],"date-time":"2025-04-26T04:03:07Z","timestamp":1745640187594,"version":"3.40.4"},"reference-count":43,"publisher":"Society for Industrial & Applied Mathematics (SIAM)","issue":"2","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["SIAM J. Comput."],"published-print":{"date-parts":[[2025,4,30]]},"DOI":"10.1137\/21m1428431","type":"journal-article","created":{"date-parts":[[2025,4,25]],"date-time":"2025-04-25T08:00:43Z","timestamp":1745568043000},"page":"503-544","source":"Crossref","is-referenced-by-count":0,"title":["A Logarithmic Lower Bound for Oblivious RAM (For All Parameters)"],"prefix":"10.1137","volume":"54","author":[{"given":"Ilan","family":"Komargodski","sequence":"first","affiliation":[{"name":"School of Computer Science and Engineering, Hebrew University of Jerusalem, 9190401 Jerusalem, Israel, and NTT Research, Sunnyvale, CA 94085 USA."}]},{"given":"Wei-Kai","family":"Lin","sequence":"additional","affiliation":[{"name":"University of Virginia, Charlottesville, VA USA."}]}],"member":"351","published-online":{"date-parts":[[2025,4,25]]},"reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-54365-8_5"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/48529.48535"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/3566049"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-023-09447-5"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813649"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-48000-7_36"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-64375-1_16"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-015-9216-2"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-70694-8_23"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-03332-3_7"},{"key":"ref15","first-page":"8","volume-title":"ITC","author":"Chan T. H.","year":"2021"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-49099-0_6"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-48797-6_16"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/3313276.3316337"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4684-2001-2_10"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/73007.73040"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2014.50"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/233551.233553"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-22012-8_46"},{"key":"ref31","first-page":"141","author":"Gordon S. D.","year":"2018","journal-title":"ASIACRYPT"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-17253-4_1"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/2213977.2213987"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-96881-0_18"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-64375-1_17"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/ITA.2018.8503262"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.29"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-36594-2_22"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516692"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1145\/258533.258606"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2018.00087"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-56784-2_15"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-17653-2_14"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-30545-0_17"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1137\/S0097539705447256"},{"key":"ref55","first-page":"197","volume-title":"Advances in Cryptology, ASIACRYPT","author":"Shi E.","year":"2011"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.25"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1145\/3177872"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1145\/384192.384193"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660365"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-021-09392-1"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382299"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1145\/322261.322274"},{"key":"ref67","first-page":"218","author":"Zahur S.","year":"2016","journal-title":"IEEE Symposium on Security and Privacy"}],"container-title":["SIAM Journal on Computing"],"original-title":[],"language":"en","deposited":{"date-parts":[[2025,4,25]],"date-time":"2025-04-25T08:00:44Z","timestamp":1745568044000},"score":1,"resource":{"primary":{"URL":"https:\/\/epubs.siam.org\/doi\/10.1137\/21M1428431"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,4,25]]},"references-count":43,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2025,4,30]]}},"alternative-id":["10.1137\/21M1428431"],"URL":"https:\/\/doi.org\/10.1137\/21m1428431","relation":{},"ISSN":["0097-5397","1095-7111"],"issn-type":[{"value":"0097-5397","type":"print"},{"value":"1095-7111","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,4,25]]}}}