Encoding, Fast and Slow:{Low-Latency} Video Processing Using Thousands of Tiny Threads S Fouladi, RS Wahby, B Shacklett, KV Balasubramaniam, W Zeng, ... 14th USENIX Symposium on Networked Systems Design and Implementation (NSDI …, 2017 | 249 | 2017 |
Doubly-efficient zkSNARKs without trusted setup RS Wahby, I Tzialla, A Shelat, J Thaler, M Walfish 2018 IEEE Symposium on Security and Privacy (SP), 926-943, 2018 | 186 | 2018 |
New architectures for radio-frequency DC–DC power conversion JM Rivas, RS Wahby, JS Shafran, DJ Perreault IEEE Transactions on Power Electronics 21 (2), 380-393, 2006 | 184 | 2006 |
Efficient RAM and control flow in verifiable outsourced computation RS Wahby, S Setty, M Howald, Z Ren, AJ Blumberg, M Walfish Cryptology ePrint Archive, 2014 | 162 | 2014 |
Pantheon: the training ground for Internet congestion-control research FY Yan, J Ma, GD Hill, D Raghavan, RS Wahby, P Levis, K Winstein 2018 USENIX Annual Technical Conference (USENIX ATC 18), 731-743, 2018 | 139 | 2018 |
Salsify:{Low-Latency} Network Video through Tighter Integration between a Video Codec and a Transport Protocol S Fouladi, J Emmons, E Orbay, C Wu, RS Wahby, K Winstein 15th USENIX Symposium on Networked Systems Design and Implementation (NSDI …, 2018 | 94 | 2018 |
Full accounting for verifiable outsourcing RS Wahby, Y Ji, AJ Blumberg, A Shelat, J Thaler, M Walfish, T Wies Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017 | 68 | 2017 |
Verifiable asics RS Wahby, M Howald, S Garg, A Shelat, M Walfish 2016 IEEE Symposium on Security and Privacy (SP), 759-778, 2016 | 59 | 2016 |
Fact: a DSL for timing-sensitive computation S Cauligi, G Soeller, B Johannesmeyer, F Brown, RS Wahby, J Renner, ... Proceedings of the 40th ACM SIGPLAN Conference on Programming Language …, 2019 | 45 | 2019 |
Finding and preventing bugs in javascript bindings F Brown, S Narayan, RS Wahby, D Engler, R Jhala, D Stefan 2017 IEEE Symposium on Security and Privacy (SP), 559-578, 2017 | 44 | 2017 |
Fast and simple constant-time hashing to the BLS12-381 elliptic curve RS Wahby, D Boneh Cryptology ePrint Archive, 2019 | 42 | 2019 |
Trust but verify: Auditing the secure Internet of things J Wilson, RS Wahby, H Corrigan-Gibbs, D Boneh, P Levis, K Winstein Proceedings of the 15th Annual International Conference on Mobile Systems …, 2017 | 41 | 2017 |
Defending against malicious peripherals with Cinch S Angel, RS Wahby, M Howald, JB Leners, M Spilo, Z Sun, AJ Blumberg, ... 25th USENIX Security Symposium (USENIX Security 16), 397-414, 2016 | 40 | 2016 |
Pairing-friendly curves Y Sakemi, T Kobayashi, T Saito, RS Wahby Internet Engineering Task Force, Internet-Draft draft-irtf-cfrg-pairing …, 2020 | 37 | 2020 |
Method and apparatus for switched-mode power conversion at radio frequencies D Perreault, J Rivas, R Wahby, J Shafran US Patent App. 11/109,498, 2005 | 36 | 2005 |
Scaling verifiable computation using efficient set accumulators A Ozdemir, R Wahby, B Whitehat, D Boneh 29th USENIX Security Symposium (USENIX Security 20), 2075-2092, 2020 | 32 | 2020 |
Robust, low-cost, auditable random number generation for embedded system security B Lampert, RS Wahby, S Leonard, P Levis Proceedings of the 14th ACM Conference on Embedded Network Sensor Systems CD …, 2016 | 28 | 2016 |
Hashing to elliptic curves A Faz-Hernandez, S Scott, N Sullivan, RS Wahby, CA Wood Internet Research Task Force, Informational, 2021 | 25 | 2021 |
Radio frequency rectifiers for DC-DC power conversion RS Wahby Massachusetts Institute of Technology, 2004 | 17 | 2004 |
BLS signatures D Boneh, S Gorbunov, R Wahby, H Wee, Z Zhang Internet Eng. Task Force, Fremont, CA, USA, Tech. Rep, 2020 | 16 | 2020 |