2017
DOI: 10.1109/tpds.2017.2729545
|View full text |Cite
|
Sign up to set email alerts
|

Nessie: A Decoupled, Client-Driven Key-Value Store Using RDMA

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 25 publications
(4 citation statements)
references
References 12 publications
0
4
0
Order By: Relevance
“…Taking into account the positive world experience of cryptographic competitions CRYPTREC [13], NESSIE [14], AES [15] and SHA3 [16], the State Service for Special Communications and Data Protection of Ukraine successfully held a national open competition of symmetric block cryptographic algorithms in 2007-2010 [17], which defeated the algorithm "Kalyna" [18], Kharkiv developers of the Institute of Information Technology [19], on the basis of which the national standard of Ukraine was developed [20]. As it has been described above, the new algorithm should provide greater cryptographic transformation speed compared to the AES algorithm [5], as well as have a higher level of stability against AES [5].…”
Section: Analysis Of Recent Research and Publicationsmentioning
confidence: 99%
“…Taking into account the positive world experience of cryptographic competitions CRYPTREC [13], NESSIE [14], AES [15] and SHA3 [16], the State Service for Special Communications and Data Protection of Ukraine successfully held a national open competition of symmetric block cryptographic algorithms in 2007-2010 [17], which defeated the algorithm "Kalyna" [18], Kharkiv developers of the Institute of Information Technology [19], on the basis of which the national standard of Ukraine was developed [20]. As it has been described above, the new algorithm should provide greater cryptographic transformation speed compared to the AES algorithm [5], as well as have a higher level of stability against AES [5].…”
Section: Analysis Of Recent Research and Publicationsmentioning
confidence: 99%
“…They employ a privilege for accesses to the memory area outside a local machine, known as remote memory. Some of them rely on the native network stack of TCP/IP [16][17][18], [22], [25][26], whereas others either exploit such features as RDMA [11][12][13][14][15], [19][20][21] or adopt new network protocols [53]. In particular, RDMA and its variants [11][12][13][14][15] expose remote memory to users directly via a collection of programming APIs, allowing users to manipulate remote memory by means of considerable application modifications.…”
Section: Programming Remote Memorymentioning
confidence: 99%
“…In addition, RDMA library is available only in a few limited programming languages. Key-value storage [16][17][18][19][20][21][22] and RDMA key-value storage [19][20][21] offer simpler API abstractions, allocating DRAM chunks from connected machines to form a large global pool of DRAM memory for storing application data. They permit applications to read their data directly from a DRAM memory pool, avoiding a huge latency from slow storage.…”
Section: Programming Remote Memorymentioning
confidence: 99%
“…In-memory key-value stores support single statement transactions consisting of either Get or Put to read or update a data. Recently, in-memory key-value stores are exploiting RDMA to reduce the communication overhead [7][8][9]17,22].…”
Section: In-memory Key-value Storementioning
confidence: 99%