{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,19]],"date-time":"2026-03-19T14:40:01Z","timestamp":1773931201794,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":50,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,11,21]],"date-time":"2024-11-21T00:00:00Z","timestamp":1732147200000},"content-version":"vor","delay-in-days":372,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Ontario Graduate Scholarships"},{"name":"Canada Research Chairs"},{"name":"Office of Naval Research"},{"name":"NSERC","award":["CRDPJ-534381"],"award-info":[{"award-number":["CRDPJ-534381"]}]},{"name":"Royal Bank of Canada"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,11,15]]},"DOI":"10.1145\/3576915.3623133","type":"proceedings-article","created":{"date-parts":[[2023,11,21]],"date-time":"2023-11-21T12:35:13Z","timestamp":1700570113000},"page":"3328-3342","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["Waks-On\/Waks-Off: Fast Oblivious Offline\/Online Shuffling and Sorting with Waksman Networks"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3447-1006","authenticated-orcid":false,"given":"Sajin","family":"Sasy","sequence":"first","affiliation":[{"name":"University of Waterloo, Waterloo, ON, Canada"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2057-1690","authenticated-orcid":false,"given":"Aaron","family":"Johnson","sequence":"additional","affiliation":[{"name":"U.S. Naval Research Laboratory, Washington, DC, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1176-2882","authenticated-orcid":false,"given":"Ian","family":"Goldberg","sequence":"additional","affiliation":[{"name":"University of Waterloo, Waterloo, ON, Canada"}]}],"member":"320","published-online":{"date-parts":[[2023,11,21]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Proceedings of the Fifteenth Annual ACM Symposium on Theory of Computing (STOC).","author":"Ajtai M.","unstructured":"M. Ajtai, J. Koml\u00f3s, and E. Szemer\u00e9di. 1983. An O(n log n) Sorting Network. In Proceedings of the Fifteenth Annual ACM Symposium on Theory of Computing (STOC)."},{"key":"e_1_3_2_1_2_1","volume-title":"Innovative Technology for CPU Based Attestation and Sealing. https:\/\/software.intel.com\/content\/www\/us\/en\/develop\/articles\/innovative-technology-for-cpu-based-attestation-and-sealing.html. Accessed","author":"Anati Ittai","year":"2023","unstructured":"Ittai Anati, Shay Gueron, Simon Johnson, and Vincent Scarlata. 2013. Innovative Technology for CPU Based Attestation and Sealing. https:\/\/software.intel.com\/content\/www\/us\/en\/develop\/articles\/innovative-technology-for-cpu-based-attestation-and-sealing.html. Accessed May 2023."},{"key":"e_1_3_2_1_3_1","series-title":"SIAM J. Comput. (2022)","volume-title":"Sorting Short Keys in Circuits of Size o(n log n)","author":"Asharov Gilad","unstructured":"Gilad Asharov, Wei-Kai Lin, and Elaine Shi. 2022. Sorting Short Keys in Circuits of Size o(n log n). SIAM J. Comput. (2022)."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1468075.1468121"},{"key":"e_1_3_2_1_5_1","volume-title":"On Arbitrary Size Waksman Networks and Their Vulnerability. Parallel Processing Letters","author":"Beauquier Bruno","year":"2002","unstructured":"Bruno Beauquier and Eric Darrot. 2002. On Arbitrary Size Waksman Networks and Their Vulnerability. Parallel Processing Letters (2002)."},{"key":"e_1_3_2_1_6_1","unstructured":"Daniel J. Bernstein. 2020. Verified fast formulas for control bits for permutation networks. Cryptology ePrint Archive Paper 2020\/1493. https:\/\/eprint.iacr.org\/2020\/1493"},{"key":"e_1_3_2_1_7_1","unstructured":"Daniel J Bernstein Tung Chou Tanja Lange Ingo von Maurich Rafael Misoczki Ruben Niederhagen Edoardo Persichetti Christiane Peters Peter Schwabe Nicolas Sendrier et al. 2017. Classic McEliece: conservative code-based cryptography. NIST submissions Vol. 1 1 (2017)."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/3132747.3132769"},{"key":"e_1_3_2_1_9_1","volume-title":"PRINCESS: Privacy-protecting Rare disease International Network Collaboration via Encryption through Software guard extensionS. Bioinformatics","author":"Chen Feng","year":"2016","unstructured":"Feng Chen, Shuang Wang, Xiaoqian Jiang, Sijie Ding, Yao Lu, Jihoon Kim, S Cenk Sahinalp, Chisato Shimizu, Jane C Burns, Victoria J Wright, Eileen Png, Martin L Hibberd, David D Lloyd, Hai Yang, Amalio Telenti, Cinnamon S Bloss, Dov Fox, Kristin Lauter, and Lucila Ohno-Machado. 2016. PRINCESS: Privacy-protecting Rare disease International Network Collaboration via Encryption through Software guard extensionS. Bioinformatics (2016)."},{"key":"e_1_3_2_1_10_1","volume-title":"IEEE European Symposium on Security and Privacy (EuroS&P).","author":"Chen Guoxing","unstructured":"Guoxing Chen, Sanchuan Chen, Yuan Xiao, Yinqian Zhang, Zhiqiang Lin, and Ten H. Lai. 2019. SgxPectre: Stealing Intel Secrets from SGX Enclaves Via Speculative Execution. In IEEE European Symposium on Security and Privacy (EuroS&P)."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-66787-4_11"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2017-0026"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3477132.3483562"},{"key":"e_1_3_2_1_14_1","volume-title":"On the Practicality of Data-oblivious Sorting. Master's thesis. Aarhus Universitet","author":"Ebbesen Kris Vestergaard","unstructured":"Kris Vestergaard Ebbesen. 2015. On the Practicality of Data-oblivious Sorting. Master's thesis. Aarhus Universitet, Datalogisk Institut."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2022.24141"},{"key":"e_1_3_2_1_16_1","volume-title":"Software Protection and Simulation on Oblivious RAMs. Journal of the ACM (JACM)","author":"Goldreich Oded","year":"1996","unstructured":"Oded Goldreich and Rafail Ostrovsky. 1996. Software Protection and Simulation on Oblivious RAMs. Journal of the ACM (JACM) (1996)."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-37682-5_15"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3488932.3497761"},{"key":"e_1_3_2_1_19_1","volume-title":"Q3 2018 Speculative Execution Side Channel Update. https:\/\/www.intel.com\/content\/www\/us\/en\/security-center\/advisory\/intel-sa-00161.html. Accessed","year":"2023","unstructured":"Intel. 2018. Q3 2018 Speculative Execution Side Channel Update. https:\/\/www.intel.com\/content\/www\/us\/en\/security-center\/advisory\/intel-sa-00161.html. Accessed August 2023."},{"key":"e_1_3_2_1_20_1","volume-title":"Intel Processors Voltage Settings Modification Advisory. https:\/\/www.intel.com\/content\/www\/us\/en\/security-center\/advisory\/intel-sa-00289.html. Accessed","year":"2023","unstructured":"Intel. 2019. Intel Processors Voltage Settings Modification Advisory. https:\/\/www.intel.com\/content\/www\/us\/en\/security-center\/advisory\/intel-sa-00289.html. Accessed August 2023."},{"key":"e_1_3_2_1_21_1","volume-title":"https:\/\/www.intel.com\/content\/www\/us\/en\/security-center\/advisory\/intel-sa-00389.html. Accessed","author":"Interface Advisory IPU","year":"2023","unstructured":"Intel. 2020. 2020.2 IPU - Intel RAPL Interface Advisory. https:\/\/www.intel.com\/content\/www\/us\/en\/security-center\/advisory\/intel-sa-00389.html. Accessed August 2023."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.14778\/3407790.3407814"},{"key":"e_1_3_2_1_23_1","volume-title":"USENIX Security Symposium.","author":"Lee Dayeol","year":"2020","unstructured":"Dayeol Lee, Dongha Jung, Ian T. Fang, Chia-Che Tsai, and Raluca Ada Popa. 2020. An Off-Chip Attack on Hardware Enclaves via the Memory Bus. In USENIX Security Symposium."},{"key":"e_1_3_2_1_24_1","volume-title":"On the Rearrangeability of 2(log2 N)-1 Stage Permutation Networks","author":"Lee Kyungsook Yoon","year":"1985","unstructured":"Kyungsook Yoon Lee. 1985. On the Rearrangeability of 2(log2 N)-1 Stage Permutation Networks. IEEE Trans. Comput. (1985)."},{"key":"e_1_3_2_1_25_1","volume-title":"A New Benes Network Control Algorithm","author":"Lee Kyungsook Yoon","year":"1987","unstructured":"Kyungsook Yoon Lee. 1987. A New Benes Network Control Algorithm. IEEE Trans. Comput. (1987)."},{"key":"e_1_3_2_1_26_1","volume-title":"Inferring Fine-grained Control Flow Inside SGX Enclaves with Branch Shadowing. In USENIX Security Symposium.","author":"Lee Sangho","year":"2017","unstructured":"Sangho Lee, Ming-Wei Shih, Prasun Gera, Taesoo Kim, Hyesoon Kim, and Marcus Peinado. 2017. Inferring Fine-grained Control Flow Inside SGX Enclaves with Branch Shadowing. In USENIX Security Symposium."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611977073.142"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00063"},{"key":"e_1_3_2_1_29_1","volume-title":"Oblix: An Efficient Oblivious Search Index. In IEEE Symposium on Security and Privacy (S&P).","author":"Mishra Pratyush","year":"2018","unstructured":"Pratyush Mishra, Rishabh Poddar, Jerry Chen, Alessandro Chiesa, and Raluca Ada Popa. 2018. Oblix: An Efficient Oblivious Search Index. In IEEE Symposium on Security and Privacy (S&P)."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00057"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.1982.1675960"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"crossref","unstructured":"Olga Ohrimenko Michael T Goodrich Roberto Tamassia and Eli Upfal. 2014. The Melbourne shuffle: Improving oblivious storage in the cloud. In International Colloquium on Automata Languages and Programming (ICALP).","DOI":"10.1007\/978-3-662-43951-7_47"},{"key":"e_1_3_2_1_33_1","volume-title":"USENIX Security Symposium.","author":"Ohrimenko Olga","year":"2016","unstructured":"Olga Ohrimenko, Felix Schuster, C\u00e9dric Fournet, Aastha Mehta, Sebastian Nowozin, Kapil Vaswani, and Manuel Costa. 2016. Oblivious multi-party machine learning on trusted processors. In USENIX Security Symposium."},{"key":"e_1_3_2_1_34_1","volume-title":"Self-Routing Superconcentrators. In Proceedings of the Twenty-Fifth Annual ACM Symposium on Theory of Computing (STOC).","author":"Pippenger Nicholas","year":"1993","unstructured":"Nicholas Pippenger. 1993. Self-Routing Superconcentrators. In Proceedings of the Twenty-Fifth Annual ACM Symposium on Theory of Computing (STOC)."},{"key":"e_1_3_2_1_35_1","volume-title":"USENIX Security Symposium.","author":"Poddar Rishabh","year":"2020","unstructured":"Rishabh Poddar, Ganesh Ananthanarayanan, Srinath Setty, Stavros Volos, and Raluca Ada Popa. 2020. Visor: Privacy-Preserving Video Analytics as a Cloud Service. In USENIX Security Symposium."},{"key":"e_1_3_2_1_36_1","volume-title":"Arpita Patra, Bhavish Raj Gopal, and Somya Sangal.","author":"Shriram A Pranav","year":"2023","unstructured":"A Pranav Shriram, Nishat Koti, Varsha Bhat Kukkala, Arpita Patra, Bhavish Raj Gopal, and Somya Sangal. 2023. Ruffle: Rapid 3-party shuffle protocols. Proceedings on Privacy Enhancing Technologies (PoPETs), Vol. 3 (2023)."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/3409964.3461783"},{"key":"e_1_3_2_1_38_1","volume-title":"USENIX Security Symposium.","author":"Rane Ashay","year":"2015","unstructured":"Ashay Rane, Calvin Lin, and Mohit Tiwari. 2015. Raccoon: Closing Digital Side-Channels through Obfuscated Execution. In USENIX Security Symposium."},{"key":"e_1_3_2_1_39_1","volume-title":"Network and Distributed System Security Symposium (NDSS).","author":"Sasy Sajin","unstructured":"Sajin Sasy, Sergey Gorbunov, and Christopher W. Fletcher. 2018. ZeroTrace: Oblivious Memory Primitives from Intel SGX. In Network and Distributed System Security Symposium (NDSS)."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/3548606.3560603"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"crossref","unstructured":"Sajin Sasy Aaron Johnson and Ian Goldberg. 2022b. Fast Fully Oblivious Compaction and Shuffling. https:\/\/crysp.uwaterloo.ca\/software\/obliv\/. Software artifact.","DOI":"10.1145\/3548606.3560603"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"crossref","unstructured":"Sajin Sasy Aaron Johnson and Ian Goldberg. 2023. Waks-On\/Waks-Off: Fast Oblivious Offline\/Online Shuffling and Sorting with Waksman Networks. https:\/\/crysp.uwaterloo.ca\/software\/obliv\/.","DOI":"10.1145\/3576915.3623133"},{"key":"e_1_3_2_1_43_1","unstructured":"Sajin Sasy and Olga Ohrimenko. 2019. Oblivious Sampling Algorithms for Private Data Analysis. In Advances in Neural Information Processing Systems (NeurIPS)."},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-35199-1_17"},{"key":"e_1_3_2_1_45_1","volume-title":"EnigMap: External-Memory Oblivious Map for Secure Enclaves. In USENIX Security Symposium.","author":"Tinoco Afonso","year":"2023","unstructured":"Afonso Tinoco, Sixiang Gao, and Elaine Shi. 2023. EnigMap: External-Memory Oblivious Map for Secure Enclaves. In USENIX Security Symposium."},{"key":"e_1_3_2_1_46_1","volume-title":"USENIX Security Symposium.","author":"Bulck Jo Van","year":"2018","unstructured":"Jo Van Bulck, Marina Minkin, Ofir Weisse, Daniel Genkin, Baris Kasikci, Frank Piessens, Mark Silberstein, Thomas F. Wenisch, Yuval Yarom, and Raoul Strackx. 2018. Foreshadow: Extracting the Keys to the Intel SGX Kingdom with Transient Out-of-Order Execution. In USENIX Security Symposium."},{"key":"e_1_3_2_1_47_1","volume-title":"A Permutation Network. Journal of the ACM (JACM)","author":"Waksman Abraham","year":"1968","unstructured":"Abraham Waksman. 1968. A Permutation Network. Journal of the ACM (JACM) (1968)."},{"key":"e_1_3_2_1_48_1","volume-title":"Controlled-Channel Attacks: Deterministic Side Channels for Untrusted Operating Systems. In IEEE Symposium on Security and Privacy (S&P).","author":"Xu Yuanzhong","year":"2015","unstructured":"Yuanzhong Xu, Weidong Cui, and Marcus Peinado. 2015. Controlled-Channel Attacks: Deterministic Side Channels for Untrusted Operating Systems. In IEEE Symposium on Security and Privacy (S&P)."},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.21"},{"key":"e_1_3_2_1_50_1","volume-title":"Opaque: An Oblivious and Encrypted Distributed Analytics Platform. In USENIX Symposium on Networked Systems Design and Implementation (NSDI).","author":"Zheng Wenting","year":"2017","unstructured":"Wenting Zheng, Ankur Dave, Jethro G Beekman, Raluca Ada Popa, Joseph E Gonzalez, and Ion Stoica. 2017. Opaque: An Oblivious and Encrypted Distributed Analytics Platform. In USENIX Symposium on Networked Systems Design and Implementation (NSDI)."}],"event":{"name":"CCS '23: ACM SIGSAC Conference on Computer and Communications Security","location":"Copenhagen Denmark","acronym":"CCS '23","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3576915.3623133","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3576915.3623133","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3576915.3623133","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,21]],"date-time":"2025-08-21T01:52:04Z","timestamp":1755741124000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3576915.3623133"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,15]]},"references-count":50,"alternative-id":["10.1145\/3576915.3623133","10.1145\/3576915"],"URL":"https:\/\/doi.org\/10.1145\/3576915.3623133","relation":{},"subject":[],"published":{"date-parts":[[2023,11,15]]},"assertion":[{"value":"2023-11-21","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}