Seguir
Ling Ren
Título
Citado por
Citado por
Ano
Path oram: An extremely simple oblivious ram protocol
E Stefanov, M Van Dijk, E Shi, C Fletcher, L Ren, X Yu, S Devadas
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
1024*2013
Constants Count: Practical Improvements to Oblivious RAM
L Ren, CW Fletcher, A Kwon, E Stefanov, E Shi, M van Dijk, S Devadas
24th USENIX Security Symposium (USENIX Security 2015), 2015
238*2015
Onion ORAM: a constant bandwidth blowup oblivious RAM
S Devadas, M van Dijk, CW Fletcher, L Ren, E Shi, D Wichs
Theory of Cryptography Conference, 145-174, 2016
1862016
Synchronous byzantine agreement with expected O (1) rounds, expected O (n2) communication, and optimal resilience
I Abraham, S Devadas, D Dolev, K Nayak, L Ren
Financial Cryptography and Data Security (FC), 2019
177*2019
Design space exploration and optimization of path oblivious ram in secure processors
L Ren, X Yu, CW Fletcher, M Van Dijk, S Devadas
Proceedings of the 40th Annual International Symposium on Computer …, 2013
1532013
Solida: A blockchain protocol based on reconfigurable byzantine consensus
I Abraham, D Malkhi, K Nayak, L Ren, A Spiegelman
arXiv preprint arXiv:1612.02916, 2016
1312016
Freecursive oram: [nearly] free recursion and integrity verification for position-based oblivious ram
CW Fletcher, L Ren, A Kwon, M van Dijk, S Devadas
Proceedings of the Twentieth International Conference on Architectural …, 2015
120*2015
Suppressing the oblivious ram timing channel while making information leakage and program efficiency trade-offs
CW Fletchery, L Ren, X Yu, M Van Dijk, O Khan, S Devadas
2014 IEEE 20th International Symposium on High Performance Computer …, 2014
1112014
Sync hotstuff: Simple and practical synchronous state machine replication
I Abraham, D Malkhi, K Nayak, L Ren, M Yin
2020 IEEE Symposium on Security and Privacy (SP), 106-118, 2020
1072020
Trapdoor Computational Fuzzy Extractors and Stateless Cryptographically-Secure Physical Unclonable Functions
C Herder, L Ren, M van Dijk, MDM Yu, S Devadas
1002015
Solidus: An incentive-compatible cryptocurrency based on permissionless byzantine consensus
I Abraham, D Malkhi, K Nayak, L Ren, A Spiegelman
CoRR, abs/1612.02916, 2016
982016
A low-latency, low-area hardware oblivious ram controller
CW Fletcher, L Ren, A Kwon, M Van Dijk, E Stefanov, D Serpanos, ...
Field-Programmable Custom Computing Machines (FCCM), 2015 IEEE 23rd Annual …, 2015
85*2015
Flexible byzantine fault tolerance
D Malkhi, K Nayak, L Ren
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019
752019
GPU-accelerated sparse LU factorization for circuit simulation with performance modeling
X Chen, L Ren, Y Wang, H Yang
IEEE Transactions on Parallel and Distributed Systems 26 (3), 786-795, 2014
732014
Communication complexity of byzantine agreement, revisited
I Abraham, TH Chan, D Dolev, K Nayak, R Pass, L Ren, E Shi
Proceedings of the 2019 ACM Symposium on Principles of Distributed Computing …, 2019
722019
Analysis of Nakamoto Consensus
L Ren
Cryptology ePrint Archive, Report 2019/943.(2019). https://eprint. iacr. org …, 2019
622019
Proof of space from stacked expanders
L Ren, S Devadas
Theory of Cryptography Conference, 262-285, 2016
622016
Bucket ORAM: Single Online Roundtrip, Constant Bandwidth Oblivious RAM.
CW Fletcher, M Naveed, L Ren, E Shi, E Stefanov
IACR Cryptology ePrint Archive 2015, 1065, 2015
602015
HOP: hardware makes obfuscation practical
K Nayak, CW Fletcher, L Ren, N Chandran, S Lokam, E Shi, V Goyal
24th Annual Network and Distributed System Security Symposium, NDSS, 2017
582017
PrORAM: dynamic prefetcher for oblivious RAM
X Yu, SK Haider, L Ren, C Fletcher, A Kwon, M van Dijk, S Devadas
Proceedings of the 42nd Annual International Symposium on Computer …, 2015
57*2015
O sistema não pode efectuar a operação agora. Tente mais tarde.
Artigos 1–20