Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Huijia Lin
@article{DBLP:journals/cacm/JainLS24, author = {Aayush Jain and Huijia Lin and Amit Sahai}, title = {Indistinguishability Obfuscation from Well-Founded Assumptions}, journal = {Commun. {ACM}}, volume = {67}, number = {3}, pages = {97--105}, year = {2024}, url = {https://doi.org/10.1145/3611095}, doi = {10.1145/3611095}, timestamp = {Sat, 23 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cacm/JainLS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/LiLPT23, author = {Hanjun Li and Huijia Lin and Antigoni Polychroniadou and Stefano Tessaro}, editor = {Jian Guo and Ron Steinfeld}, title = {{LERNA:} Secure Single-Server Aggregation via Key-Homomorphic Masking}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2023 - 29th International Conference on the Theory and Application of Cryptology and Information Security, Guangzhou, China, December 4-8, 2023, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {14438}, pages = {302--334}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-981-99-8721-4\_10}, doi = {10.1007/978-981-99-8721-4\_10}, timestamp = {Sun, 07 Jan 2024 14:24:23 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/LiLPT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/colt/DworkLLT23, author = {Cynthia Dwork and Daniel Lee and Huijia Lin and Pranay Tankala}, editor = {Gergely Neu and Lorenzo Rosasco}, title = {From Pseudorandomness to Multi-Group Fairness and Back}, booktitle = {The Thirty Sixth Annual Conference on Learning Theory, {COLT} 2023, 12-15 July 2023, Bangalore, India}, series = {Proceedings of Machine Learning Research}, volume = {195}, pages = {3566--3614}, publisher = {{PMLR}}, year = {2023}, url = {https://proceedings.mlr.press/v195/dwork23a.html}, timestamp = {Wed, 06 Sep 2023 17:49:05 +0200}, biburl = {https://dblp.org/rec/conf/colt/DworkLLT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/JainLLW23, author = {Aayush Jain and Huijia Lin and Ji Luo and Daniel Wichs}, editor = {Helena Handschuh and Anna Lysyanskaya}, title = {The Pseudorandom Oracle Model and Ideal Obfuscation}, booktitle = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August 20-24, 2023, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {14084}, pages = {233--262}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-38551-3\_8}, doi = {10.1007/978-3-031-38551-3\_8}, timestamp = {Fri, 18 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/JainLLW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/DaoIJL23, author = {Quang Dao and Yuval Ishai and Aayush Jain and Huijia Lin}, editor = {Helena Handschuh and Anna Lysyanskaya}, title = {Multi-party Homomorphic Secret Sharing and Sublinear {MPC} from Sparse {LPN}}, booktitle = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August 20-24, 2023, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {14082}, pages = {315--348}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-38545-2\_11}, doi = {10.1007/978-3-031-38545-2\_11}, timestamp = {Mon, 14 Aug 2023 16:16:25 +0200}, biburl = {https://dblp.org/rec/conf/crypto/DaoIJL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BallLLL23, author = {Marshall Ball and Hanjun Li and Huijia Lin and Tianren Liu}, editor = {Carmit Hazay and Martijn Stam}, title = {New Ways to Garble Arithmetic Circuits}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2023 - 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Lyon, France, April 23-27, 2023, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {14005}, pages = {3--34}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-30617-4\_1}, doi = {10.1007/978-3-031-30617-4\_1}, timestamp = {Fri, 15 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/BallLLL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/JainLLS23, author = {Aayush Jain and Huijia Lin and Paul Lou and Amit Sahai}, editor = {Carmit Hazay and Martijn Stam}, title = {Polynomial-Time Cryptanalysis of the Subspace Flooding Assumption for Post-quantum i{\unicode{54442}}}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2023 - 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Lyon, France, April 23-27, 2023, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {14004}, pages = {205--235}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-30545-0\_8}, doi = {10.1007/978-3-031-30545-0\_8}, timestamp = {Thu, 20 Apr 2023 11:35:01 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/JainLLS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/JainLL23, author = {Aayush Jain and Huijia Lin and Ji Luo}, editor = {Carmit Hazay and Martijn Stam}, title = {On the Optimal Succinctness and Efficiency of Functional Encryption and Attribute-Based Encryption}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2023 - 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Lyon, France, April 23-27, 2023, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {14006}, pages = {479--510}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-30620-4\_16}, doi = {10.1007/978-3-031-30620-4\_16}, timestamp = {Sat, 29 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/JainLL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/focs/HsiehLL23, author = {Yao{-}Ching Hsieh and Huijia Lin and Ji Luo}, title = {Attribute-Based Encryption for Circuits of Unbounded Depth from Lattices}, booktitle = {64th {IEEE} Annual Symposium on Foundations of Computer Science, {FOCS} 2023, Santa Cruz, CA, USA, November 6-9, 2023}, pages = {415--434}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/FOCS57990.2023.00031}, doi = {10.1109/FOCS57990.2023.00031}, timestamp = {Wed, 07 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/focs/HsiehLL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2301-08837, author = {Cynthia Dwork and Daniel Lee and Huijia Lin and Pranay Tankala}, title = {New Insights into Multi-Calibration}, journal = {CoRR}, volume = {abs/2301.08837}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2301.08837}, doi = {10.48550/ARXIV.2301.08837}, eprinttype = {arXiv}, eprint = {2301.08837}, timestamp = {Thu, 26 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2301-08837.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BallLLL23, author = {Marshall Ball and Hanjun Li and Huijia Lin and Tianren Liu}, title = {New Ways to Garble Arithmetic Circuits}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {501}, year = {2023}, url = {https://eprint.iacr.org/2023/501}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/BallLLL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DaoIJL23, author = {Quang Dao and Yuval Ishai and Aayush Jain and Huijia Lin}, title = {Multi-Party Homomorphic Secret Sharing and Sublinear {MPC} from Sparse {LPN}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1593}, year = {2023}, url = {https://eprint.iacr.org/2023/1593}, timestamp = {Thu, 09 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/DaoIJL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HsiehLL23, author = {Yao{-}Ching Hsieh and Huijia Lin and Ji Luo}, title = {Attribute-Based Encryption for Circuits of Unbounded Depth from Lattices: Garbled Circuits of Optimal Size, Laconic Functional Evaluation, and More}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1716}, year = {2023}, url = {https://eprint.iacr.org/2023/1716}, timestamp = {Fri, 08 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/HsiehLL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiLPT23, author = {Hanjun Li and Huijia Lin and Antigoni Polychroniadou and Stefano Tessaro}, title = {{LERNA:} Secure Single-Server Aggregation via Key-Homomorphic Masking}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1936}, year = {2023}, url = {https://eprint.iacr.org/2023/1936}, timestamp = {Wed, 10 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/LiLPT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/LinL22, author = {Huijia Lin and Tianren Liu}, editor = {Yevgeniy Dodis and Thomas Shrimpton}, title = {Two-Round {MPC} Without Round Collapsing Revisited - Towards Efficient Malicious Protocols}, booktitle = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August 15-18, 2022, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {13507}, pages = {353--382}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-15802-5\_13}, doi = {10.1007/978-3-031-15802-5\_13}, timestamp = {Wed, 19 Oct 2022 17:37:44 +0200}, biburl = {https://dblp.org/rec/conf/crypto/LinL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BitanskyLS22, author = {Nir Bitansky and Huijia Lin and Omri Shmueli}, editor = {Orr Dunkelman and Stefan Dziembowski}, title = {Non-malleable Commitments Against Quantum Attacks}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30 - June 3, 2022, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {13277}, pages = {519--550}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-07082-2\_19}, doi = {10.1007/978-3-031-07082-2\_19}, timestamp = {Tue, 31 May 2022 17:23:10 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BitanskyLS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/JainLS22, author = {Aayush Jain and Huijia Lin and Amit Sahai}, editor = {Orr Dunkelman and Stefan Dziembowski}, title = {Indistinguishability Obfuscation from {LPN} over {\textdollar}{\textbackslash}mathbb \{F\}{\_}p{\textdollar}, DLIN, and PRGs in NC\({}^{\mbox{0}}\)}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30 - June 3, 2022, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {13275}, pages = {670--699}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-06944-4\_23}, doi = {10.1007/978-3-031-06944-4\_23}, timestamp = {Tue, 31 May 2022 17:23:10 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/JainLS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/LiLL22, author = {Hanjun Li and Huijia Lin and Ji Luo}, editor = {Eike Kiltz and Vinod Vaikuntanathan}, title = {{ABE} for Circuits with Constant-Size Secret Keys and Adaptive Security}, booktitle = {Theory of Cryptography - 20th International Conference, {TCC} 2022, Chicago, IL, USA, November 7-10, 2022, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {13747}, pages = {680--710}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-22318-1\_24}, doi = {10.1007/978-3-031-22318-1\_24}, timestamp = {Fri, 15 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/tcc/LiLL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/MaiyyaISAALTZ22, author = {Sujaya Maiyya and Seif Ibrahim and Caitlin Scarberry and Divyakant Agrawal and Amr El Abbadi and Huijia Lin and Stefano Tessaro and Victor Zakhary}, editor = {Kevin R. B. Butler and Kurt Thomas}, title = {QuORAM: {A} Quorum-Replicated Fault Tolerant {ORAM} Datastore}, booktitle = {31st {USENIX} Security Symposium, {USENIX} Security 2022, Boston, MA, USA, August 10-12, 2022}, pages = {3665--3682}, publisher = {{USENIX} Association}, year = {2022}, url = {https://www.usenix.org/conference/usenixsecurity22/presentation/maiyya}, timestamp = {Tue, 18 Oct 2022 17:10:36 +0200}, biburl = {https://dblp.org/rec/conf/uss/MaiyyaISAALTZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiLL22, author = {Hanjun Li and Huijia Lin and Ji Luo}, title = {{ABE} for Circuits with Constant-Size Secret Keys and Adaptive Security}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {659}, year = {2022}, url = {https://eprint.iacr.org/2022/659}, timestamp = {Fri, 15 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/LiLL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MaiyyaISAALTZ22, author = {Sujaya Maiyya and Seif Ibrahim and Caitlin Scarberry and Divyakant Agrawal and Amr El Abbadi and Huijia Lin and Stefano Tessaro and Victor Zakhary}, title = {QuORAM: {A} Quorum-Replicated Fault Tolerant {ORAM} Datastore}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {691}, year = {2022}, url = {https://eprint.iacr.org/2022/691}, timestamp = {Mon, 20 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MaiyyaISAALTZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LinL22, author = {Huijia Lin and Tianren Liu}, title = {Two-Round {MPC} without Round Collapsing Revisited - Towards Efficient Malicious Protocols}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {944}, year = {2022}, url = {https://eprint.iacr.org/2022/944}, timestamp = {Tue, 27 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LinL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JainL0W22, author = {Aayush Jain and Huijia Lin and Ji Luo and Daniel Wichs}, title = {The Pseudorandom Oracle Model and Ideal Obfuscation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1204}, year = {2022}, url = {https://eprint.iacr.org/2022/1204}, timestamp = {Tue, 27 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JainL0W22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JainLL22, author = {Aayush Jain and Huijia Lin and Ji Luo}, title = {On the Optimal Succinctness and Efficiency of Functional Encryption and Attribute-Based Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1317}, year = {2022}, url = {https://eprint.iacr.org/2022/1317}, timestamp = {Sat, 22 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JainLL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JainLLS22, author = {Aayush Jain and Huijia Lin and Paul Lou and Amit Sahai}, title = {Polynomial-Time Cryptanalysis of the Subspace Flooding Assumption for Post-Quantum i{\unicode{54442}}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1637}, year = {2022}, url = {https://eprint.iacr.org/2022/1637}, timestamp = {Thu, 05 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/JainLLS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/HopkinsJL21, author = {Samuel B. Hopkins and Aayush Jain and Huijia Lin}, editor = {Tal Malkin and Chris Peikert}, title = {Counterexamples to New Circular Security Assumptions Underlying iO}, booktitle = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20, 2021, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12826}, pages = {673--700}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-84245-1\_23}, doi = {10.1007/978-3-030-84245-1\_23}, timestamp = {Mon, 16 Aug 2021 09:08:14 +0200}, biburl = {https://dblp.org/rec/conf/crypto/HopkinsJL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/GayJLS21, author = {Romain Gay and Aayush Jain and Huijia Lin and Amit Sahai}, editor = {Anne Canteaut and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Indistinguishability Obfuscation from Simple-to-State Hard Problems: New Assumptions, New Techniques, and Simplification}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2021 - 40th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, October 17-21, 2021, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {12698}, pages = {97--126}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-77883-5\_4}, doi = {10.1007/978-3-030-77883-5\_4}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/GayJLS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/GriloL0V21, author = {Alex B. Grilo and Huijia Lin and Fang Song and Vinod Vaikuntanathan}, editor = {Anne Canteaut and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Oblivious Transfer Is in MiniQCrypt}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2021 - 40th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, October 17-21, 2021, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12697}, pages = {531--561}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-77886-6\_18}, doi = {10.1007/978-3-030-77886-6\_18}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/GriloL0V21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Benhamouda0KL21, author = {Fabrice Benhamouda and Aayush Jain and Ilan Komargodski and Huijia Lin}, editor = {Anne Canteaut and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Multiparty Reusable Non-interactive Secure Computation from {LWE}}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2021 - 40th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, October 17-21, 2021, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12697}, pages = {724--753}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-77886-6\_25}, doi = {10.1007/978-3-030-77886-6\_25}, timestamp = {Thu, 17 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Benhamouda0KL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fsttcs/Lin21, author = {Huijia (Rachel) Lin}, editor = {Mikolaj Bojanczyk and Chandra Chekuri}, title = {Indistinguishability Obfuscation from Well-Founded Assumptions (Invited Talk)}, booktitle = {41st {IARCS} Annual Conference on Foundations of Software Technology and Theoretical Computer Science, {FSTTCS} 2021, December 15-17, 2021, Virtual Conference}, series = {LIPIcs}, volume = {213}, pages = {4:1--4:1}, publisher = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik}, year = {2021}, url = {https://doi.org/10.4230/LIPIcs.FSTTCS.2021.4}, doi = {10.4230/LIPICS.FSTTCS.2021.4}, timestamp = {Tue, 30 Nov 2021 13:59:34 +0100}, biburl = {https://dblp.org/rec/conf/fsttcs/Lin21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stoc/JainLS21, author = {Aayush Jain and Huijia Lin and Amit Sahai}, editor = {Samir Khuller and Virginia Vassilevska Williams}, title = {Indistinguishability obfuscation from well-founded assumptions}, booktitle = {{STOC} '21: 53rd Annual {ACM} {SIGACT} Symposium on Theory of Computing, Virtual Event, Italy, June 21-25, 2021}, pages = {60--73}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3406325.3451093}, doi = {10.1145/3406325.3451093}, timestamp = {Tue, 22 Jun 2021 19:47:11 +0200}, biburl = {https://dblp.org/rec/conf/stoc/JainLS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BenhamoudaJKL21, author = {Fabrice Benhamouda and Aayush Jain and Ilan Komargodski and Huijia Lin}, title = {Multiparty Reusable Non-Interactive Secure Computation from {LWE}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {378}, year = {2021}, url = {https://eprint.iacr.org/2021/378}, timestamp = {Wed, 07 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BenhamoudaJKL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HopkinsJL21, author = {Samuel B. Hopkins and Aayush Jain and Huijia Lin}, title = {Counterexamples to New Circular Security Assumptions Underlying iO}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {889}, year = {2021}, url = {https://eprint.iacr.org/2021/889}, timestamp = {Wed, 07 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HopkinsJL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BitanskyLS21, author = {Nir Bitansky and Huijia Lin and Omri Shmueli}, title = {Non-malleable Commitments against Quantum Attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {920}, year = {2021}, url = {https://eprint.iacr.org/2021/920}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BitanskyLS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JainLS21, author = {Aayush Jain and Huijia Lin and Amit Sahai}, title = {Indistinguishability Obfuscation from {LPN} over F{\_}p, DLIN, and PRGs in NC{\^{}}0}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1334}, year = {2021}, url = {https://eprint.iacr.org/2021/1334}, timestamp = {Fri, 12 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/JainLS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/siamcomp/LinPS20, author = {Huijia Lin and Rafael Pass and Pratik Soni}, title = {Two-Round and Non-Interactive Concurrent Non-Malleable Commitments from Time-Lock Puzzles}, journal = {{SIAM} J. Comput.}, volume = {49}, number = {4}, year = {2020}, url = {https://doi.org/10.1137/17M1163177}, doi = {10.1137/17M1163177}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/siamcomp/LinPS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/Lin020, author = {Huijia Lin and Ji Luo}, editor = {Shiho Moriai and Huaxiong Wang}, title = {Succinct and Adaptively Secure {ABE} for {ABP} from k-Lin}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2020 - 26th International Conference on the Theory and Application of Cryptology and Information Security, Daejeon, South Korea, December 7-11, 2020, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {12493}, pages = {437--466}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-64840-4\_15}, doi = {10.1007/978-3-030-64840-4\_15}, timestamp = {Thu, 17 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/Lin020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/LinL20, author = {Huijia Lin and Ji Luo}, editor = {Anne Canteaut and Yuval Ishai}, title = {Compact Adaptively Secure {ABE} from k-Lin: Beyond NC\({}^{\mbox{1}}\) and Towards {NL}}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2020 - 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, May 10-14, 2020, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {12107}, pages = {247--277}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-45727-3\_9}, doi = {10.1007/978-3-030-45727-3\_9}, timestamp = {Fri, 22 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/LinL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/BenhamoudaL20, author = {Fabrice Benhamouda and Huijia Lin}, editor = {Rafael Pass and Krzysztof Pietrzak}, title = {Mr {NISC:} Multiparty Reusable Non-Interactive Secure Computation}, booktitle = {Theory of Cryptography - 18th International Conference, {TCC} 2020, Durham, NC, USA, November 16-19, 2020, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12551}, pages = {349--378}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-64378-2\_13}, doi = {10.1007/978-3-030-64378-2\_13}, timestamp = {Tue, 15 Dec 2020 12:01:12 +0100}, biburl = {https://dblp.org/rec/conf/tcc/BenhamoudaL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/LinLW20, author = {Huijia Lin and Tianren Liu and Hoeteck Wee}, editor = {Rafael Pass and Krzysztof Pietrzak}, title = {Information-Theoretic 2-Round {MPC} Without Round Collapsing: Adaptive Security, and More}, booktitle = {Theory of Cryptography - 18th International Conference, {TCC} 2020, Durham, NC, USA, November 16-19, 2020, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12551}, pages = {502--531}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-64378-2\_18}, doi = {10.1007/978-3-030-64378-2\_18}, timestamp = {Tue, 15 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/tcc/LinLW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2008-09317, author = {Aayush Jain and Huijia Lin and Amit Sahai}, title = {Indistinguishability Obfuscation from Well-Founded Assumptions}, journal = {CoRR}, volume = {abs/2008.09317}, year = {2020}, url = {https://arxiv.org/abs/2008.09317}, eprinttype = {arXiv}, eprint = {2008.09317}, timestamp = {Fri, 28 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2008-09317.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2011-14980, author = {Alex B. Grilo and Huijia Lin and Fang Song and Vinod Vaikuntanathan}, title = {Oblivious Transfer is in MiniQCrypt}, journal = {CoRR}, volume = {abs/2011.14980}, year = {2020}, url = {https://arxiv.org/abs/2011.14980}, eprinttype = {arXiv}, eprint = {2011.14980}, timestamp = {Mon, 07 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2011-14980.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eccc/JainLS20, author = {Aayush Jain and Huijia Lin and Amit Sahai}, title = {Indistinguishability Obfuscation from Well-Founded Assumptions}, journal = {Electron. Colloquium Comput. Complex.}, volume = {{TR20-126}}, year = {2020}, url = {https://eccc.weizmann.ac.il/report/2020/126}, eprinttype = {ECCC}, eprint = {TR20-126}, timestamp = {Tue, 27 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eccc/JainLS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BenhamoudaL20, author = {Fabrice Benhamouda and Huijia Lin}, title = {Multiparty Reusable Non-Interactive Secure Computation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {221}, year = {2020}, url = {https://eprint.iacr.org/2020/221}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BenhamoudaL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LinL20, author = {Huijia Lin and Ji Luo}, title = {Compact Adaptively Secure {ABE} from k-Lin: Beyond {NC1} and towards {NL}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {318}, year = {2020}, url = {https://eprint.iacr.org/2020/318}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LinL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GayJLS20, author = {Romain Gay and Aayush Jain and Huijia Lin and Amit Sahai}, title = {Indistinguishability Obfuscation from Simple-to-State Hard Problems: New Assumptions, New Techniques, and Simplification}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {764}, year = {2020}, url = {https://eprint.iacr.org/2020/764}, timestamp = {Tue, 30 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GayJLS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JainLS20, author = {Aayush Jain and Huijia Lin and Amit Sahai}, title = {Indistinguishability Obfuscation from Well-Founded Assumptions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1003}, year = {2020}, url = {https://eprint.iacr.org/2020/1003}, timestamp = {Wed, 02 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JainLS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LinL20b, author = {Huijia Lin and Ji Luo}, title = {Succinct and Adaptively Secure {ABE} for Arithmetic Branching Programs from k-Lin}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1139}, year = {2020}, url = {https://eprint.iacr.org/2020/1139}, timestamp = {Wed, 30 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LinL20b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LinLW20, author = {Huijia Lin and Tianren Liu and Hoeteck Wee}, title = {Information-Theoretic 2-Round {MPC} without Round Collapsing: Adaptive Security, and More}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1431}, year = {2020}, url = {https://eprint.iacr.org/2020/1431}, timestamp = {Wed, 02 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/LinLW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GriloLSV20, author = {Alex B. Grilo and Huijia Lin and Fang Song and Vinod Vaikuntanathan}, title = {Oblivious Transfer is in MiniQCrypt}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1500}, year = {2020}, url = {https://eprint.iacr.org/2020/1500}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/GriloLSV20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/AnanthJL0S19, author = {Prabhanjan Ananth and Aayush Jain and Huijia Lin and Christian Matt and Amit Sahai}, editor = {Alexandra Boldyreva and Daniele Micciancio}, title = {Indistinguishability Obfuscation Without Multilinear Maps: New Paradigms via Low Degree Weak Pseudorandomness and Security Amplification}, booktitle = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {11694}, pages = {284--332}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-26954-8\_10}, doi = {10.1007/978-3-030-26954-8\_10}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/AnanthJL0S19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/JainL0S19, author = {Aayush Jain and Huijia Lin and Christian Matt and Amit Sahai}, editor = {Yuval Ishai and Vincent Rijmen}, title = {How to Leverage Hardness of Constant-Degree Expanding Polynomials over {\textbackslash}mathbb {R} {R} to build i{\unicode{54442}} i {O}}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2019 - 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Darmstadt, Germany, May 19-23, 2019, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11476}, pages = {251--281}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-17653-2\_9}, doi = {10.1007/978-3-030-17653-2\_9}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/JainL0S19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BallDKLM19, author = {Marshall Ball and Dana Dachman{-}Soled and Mukul Kulkarni and Huijia Lin and Tal Malkin}, editor = {Yuval Ishai and Vincent Rijmen}, title = {Non-Malleable Codes Against Bounded Polynomial Time Tampering}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2019 - 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Darmstadt, Germany, May 19-23, 2019, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11476}, pages = {501--530}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-17653-2\_17}, doi = {10.1007/978-3-030-17653-2\_17}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BallDKLM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AnanthJL0S19, author = {Prabhanjan Ananth and Aayush Jain and Huijia Lin and Christian Matt and Amit Sahai}, title = {Indistinguishability Obfuscation Without Multilinear Maps: New Paradigms via Low Degree Weak Pseudorandomness and Security Amplification}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {643}, year = {2019}, url = {https://eprint.iacr.org/2019/643}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AnanthJL0S19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JainLMS19, author = {Aayush Jain and Huijia Lin and Christian Matt and Amit Sahai}, title = {How to leverage hardness of constant degree expanding polynomials over {R} to build iO}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1030}, year = {2019}, url = {https://eprint.iacr.org/2019/1030}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JainLMS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JainLS19, author = {Aayush Jain and Huijia Lin and Amit Sahai}, title = {Simplifying Constructions and Assumptions for i{\unicode{54442}}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1252}, year = {2019}, url = {https://eprint.iacr.org/2019/1252}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JainLS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/siamcomp/BitanskyCGHJLPT18, author = {Nir Bitansky and Ran Canetti and Sanjam Garg and Justin Holmgren and Abhishek Jain and Huijia Lin and Rafael Pass and Sidharth Telang and Vinod Vaikuntanathan}, title = {Indistinguishability Obfuscation for {RAM} Programs and Succinct Randomized Encodings}, journal = {{SIAM} J. Comput.}, volume = {47}, number = {3}, pages = {1123--1210}, year = {2018}, url = {https://doi.org/10.1137/15M1050963}, doi = {10.1137/15M1050963}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/siamcomp/BitanskyCGHJLPT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/edbt/ZakharySALT18, author = {Victor Zakhary and Cetin Sahin and Amr El Abbadi and Huijia Lin and Stefano Tessaro}, editor = {Michael H. B{\"{o}}hlen and Reinhard Pichler and Norman May and Erhard Rahm and Shan{-}Hung Wu and Katja Hose}, title = {Pharos: Privacy Hazards of Replicating {ORAM} Stores}, booktitle = {Proceedings of the 21st International Conference on Extending Database Technology, {EDBT} 2018, Vienna, Austria, March 26-29, 2018}, pages = {702--705}, publisher = {OpenProceedings.org}, year = {2018}, url = {https://doi.org/10.5441/002/edbt.2018.89}, doi = {10.5441/002/EDBT.2018.89}, timestamp = {Fri, 29 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/edbt/ZakharySALT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BenhamoudaL18, author = {Fabrice Benhamouda and Huijia Lin}, editor = {Jesper Buus Nielsen and Vincent Rijmen}, title = {k-Round Multiparty Computation from k-Round Oblivious Transfer via Garbled Interactive Circuits}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10821}, pages = {500--532}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-78375-8\_17}, doi = {10.1007/978-3-319-78375-8\_17}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BenhamoudaL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/innovations/BoyleGILT18, author = {Elette Boyle and Niv Gilboa and Yuval Ishai and Huijia Lin and Stefano Tessaro}, editor = {Anna R. Karlin}, title = {Foundations of Homomorphic Secret Sharing}, booktitle = {9th Innovations in Theoretical Computer Science Conference, {ITCS} 2018, January 11-14, 2018, Cambridge, MA, {USA}}, series = {LIPIcs}, volume = {94}, pages = {21:1--21:21}, publisher = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik}, year = {2018}, url = {https://doi.org/10.4230/LIPIcs.ITCS.2018.21}, doi = {10.4230/LIPICS.ITCS.2018.21}, timestamp = {Tue, 11 Feb 2020 15:52:14 +0100}, biburl = {https://dblp.org/rec/conf/innovations/BoyleGILT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/BenhamoudaLPV18, author = {Fabrice Benhamouda and Huijia Lin and Antigoni Polychroniadou and Muthuramakrishnan Venkitasubramaniam}, editor = {Amos Beimel and Stefan Dziembowski}, title = {Two-Round Adaptively Secure Multiparty Computation from Standard Assumptions}, booktitle = {Theory of Cryptography - 16th International Conference, {TCC} 2018, Panaji, India, November 11-14, 2018, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11239}, pages = {175--205}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-03807-6\_7}, doi = {10.1007/978-3-030-03807-6\_7}, timestamp = {Sat, 09 Apr 2022 12:44:08 +0200}, biburl = {https://dblp.org/rec/conf/tcc/BenhamoudaLPV18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/BitanskyL18, author = {Nir Bitansky and Huijia Lin}, editor = {Amos Beimel and Stefan Dziembowski}, title = {One-Message Zero Knowledge and Non-malleable Commitments}, booktitle = {Theory of Cryptography - 16th International Conference, {TCC} 2018, Panaji, India, November 11-14, 2018, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11239}, pages = {209--234}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-03807-6\_8}, doi = {10.1007/978-3-030-03807-6\_8}, timestamp = {Mon, 05 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/tcc/BitanskyL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BitanskyL18, author = {Nir Bitansky and Huijia Lin}, title = {One-Message Zero Knowledge and Non-Malleable Commitments}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {613}, year = {2018}, url = {https://eprint.iacr.org/2018/613}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BitanskyL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LinM18, author = {Huijia Lin and Christian Matt}, title = {Pseudo Flawed-Smudging Generators and Their Application to Indistinguishability Obfuscation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {646}, year = {2018}, url = {https://eprint.iacr.org/2018/646}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LinM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BallDKLM18, author = {Marshall Ball and Dana Dachman{-}Soled and Mukul Kulkarni and Huijia Lin and Tal Malkin}, title = {Non-Malleable Codes Against Bounded Polynomial Time Tampering}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1015}, year = {2018}, url = {https://eprint.iacr.org/2018/1015}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/BallDKLM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/BitanskyCCGLRT17, author = {Nir Bitansky and Ran Canetti and Alessandro Chiesa and Shafi Goldwasser and Huijia Lin and Aviad Rubinstein and Eran Tromer}, title = {The Hunting of the {SNARK}}, journal = {J. Cryptol.}, volume = {30}, number = {4}, pages = {989--1066}, year = {2017}, url = {https://doi.org/10.1007/s00145-016-9241-9}, doi = {10.1007/S00145-016-9241-9}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/BitanskyCCGLRT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Lin17, author = {Huijia Lin}, editor = {Jonathan Katz and Hovav Shacham}, title = {Indistinguishability Obfuscation from {SXDH} on 5-Linear Maps and Locality-5 PRGs}, booktitle = {Advances in Cryptology - {CRYPTO} 2017 - 37th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10401}, pages = {599--629}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-63688-7\_20}, doi = {10.1007/978-3-319-63688-7\_20}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/Lin17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/LinT17, author = {Huijia Lin and Stefano Tessaro}, editor = {Jonathan Katz and Hovav Shacham}, title = {Indistinguishability Obfuscation from Trilinear Maps and Block-Wise Local PRGs}, booktitle = {Advances in Cryptology - {CRYPTO} 2017 - 37th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10401}, pages = {630--660}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-63688-7\_21}, doi = {10.1007/978-3-319-63688-7\_21}, timestamp = {Mon, 14 Aug 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/LinT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BitanskyLP17, author = {Nir Bitansky and Huijia Lin and Omer Paneth}, editor = {Jean{-}S{\'{e}}bastien Coron and Jesper Buus Nielsen}, title = {On Removing Graded Encodings from Functional Encryption}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 - May 4, 2017, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10211}, pages = {3--29}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-56614-6\_1}, doi = {10.1007/978-3-319-56614-6\_1}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BitanskyLP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/focs/LinPS17, author = {Huijia Lin and Rafael Pass and Pratik Soni}, editor = {Chris Umans}, title = {Two-Round and Non-Interactive Concurrent Non-Malleable Commitments from Time-Lock Puzzles}, booktitle = {58th {IEEE} Annual Symposium on Foundations of Computer Science, {FOCS} 2017, Berkeley, CA, USA, October 15-17, 2017}, pages = {576--587}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/FOCS.2017.59}, doi = {10.1109/FOCS.2017.59}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/focs/LinPS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icde/SahinMZALT17, author = {Cetin Sahin and Aaron Magat and Victor Zakhary and Amr El Abbadi and Huijia (Rachel) Lin and Stefano Tessaro}, title = {Understanding the Security Challenges of Oblivious Cloud Storage with Asynchronous Accesses}, booktitle = {33rd {IEEE} International Conference on Data Engineering, {ICDE} 2017, San Diego, CA, USA, April 19-22, 2017}, pages = {1377--1378}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/ICDE.2017.185}, doi = {10.1109/ICDE.2017.185}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icde/SahinMZALT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/KiyoshimaLV17, author = {Susumu Kiyoshima and Huijia Lin and Muthuramakrishnan Venkitasubramaniam}, editor = {Yael Kalai and Leonid Reyzin}, title = {A Unified Approach to Constructing Black-Box {UC} Protocols in Trusted Setup Models}, booktitle = {Theory of Cryptography - 15th International Conference, {TCC} 2017, Baltimore, MD, USA, November 12-15, 2017, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10677}, pages = {776--809}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-70500-2\_26}, doi = {10.1007/978-3-319-70500-2\_26}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/tcc/KiyoshimaLV17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LinT17, author = {Huijia Lin and Stefano Tessaro}, title = {Indistinguishability Obfuscation from Bilinear Maps and Block-Wise Local PRGs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {250}, year = {2017}, url = {http://eprint.iacr.org/2017/250}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LinT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LinPS17, author = {Huijia Lin and Rafael Pass and Pratik Soni}, title = {Two-Round Concurrent Non-Malleable Commitment from Time-Lock Puzzles}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {273}, year = {2017}, url = {http://eprint.iacr.org/2017/273}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LinPS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KiyoshimaLV17, author = {Susumu Kiyoshima and Huijia Lin and Muthuramakrishnan Venkitasubramaniam}, title = {A Unified Approach to Constructing Black-box {UC} Protocols in Trusted Setup Models}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {944}, year = {2017}, url = {http://eprint.iacr.org/2017/944}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KiyoshimaLV17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BenhamoudaL17, author = {Fabrice Benhamouda and Huijia Lin}, title = {k-Round {MPC} from k-Round {OT} via Garbled Interactive Circuits}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1125}, year = {2017}, url = {http://eprint.iacr.org/2017/1125}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BenhamoudaL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BoyleGILT17, author = {Elette Boyle and Niv Gilboa and Yuval Ishai and Huijia Lin and Stefano Tessaro}, title = {Foundations of Homomorphic Secret Sharing}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1248}, year = {2017}, url = {http://eprint.iacr.org/2017/1248}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BoyleGILT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/siamcomp/CanettiLP16, author = {Ran Canetti and Huijia Lin and Rafael Pass}, title = {Adaptive Hardness and Composable Security in the Plain Model from Standard Assumptions}, journal = {{SIAM} J. Comput.}, volume = {45}, number = {5}, pages = {1793--1834}, year = {2016}, url = {https://doi.org/10.1137/110847196}, doi = {10.1137/110847196}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/siamcomp/CanettiLP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Lin16, author = {Huijia Lin}, editor = {Marc Fischlin and Jean{-}S{\'{e}}bastien Coron}, title = {Indistinguishability Obfuscation from Constant-Degree Graded Encoding Schemes}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9665}, pages = {28--57}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-49890-3\_2}, doi = {10.1007/978-3-662-49890-3\_2}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Lin16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/focs/LinV16, author = {Huijia Lin and Vinod Vaikuntanathan}, editor = {Irit Dinur}, title = {Indistinguishability Obfuscation from DDH-Like Assumptions on Constant-Degree Graded Encodings}, booktitle = {{IEEE} 57th Annual Symposium on Foundations of Computer Science, {FOCS} 2016, 9-11 October 2016, Hyatt Regency, New Brunswick, New Jersey, {USA}}, pages = {11--20}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/FOCS.2016.11}, doi = {10.1109/FOCS.2016.11}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/focs/LinV16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/LinPST16, author = {Huijia Lin and Rafael Pass and Karn Seth and Sidharth Telang}, editor = {Chen{-}Mou Cheng and Kai{-}Min Chung and Giuseppe Persiano and Bo{-}Yin Yang}, title = {Indistinguishability Obfuscation with Non-trivial Efficiency}, booktitle = {Public-Key Cryptography - {PKC} 2016 - 19th {IACR} International Conference on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan, March 6-9, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9615}, pages = {447--462}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-49387-8\_17}, doi = {10.1007/978-3-662-49387-8\_17}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/LinPST16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/SahinZALT16, author = {Cetin Sahin and Victor Zakhary and Amr El Abbadi and Huijia Lin and Stefano Tessaro}, title = {TaoStore: Overcoming Asynchronicity in Oblivious Data Storage}, booktitle = {{IEEE} Symposium on Security and Privacy, {SP} 2016, San Jose, CA, USA, May 22-26, 2016}, pages = {198--217}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/SP.2016.20}, doi = {10.1109/SP.2016.20}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/SahinZALT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/AnanthCCLL16, author = {Prabhanjan Ananth and Yu{-}Chi Chen and Kai{-}Min Chung and Huijia Lin and Wei{-}Kai Lin}, editor = {Martin Hirt and Adam D. Smith}, title = {Delegating {RAM} Computations with Adaptive Soundness and Privacy}, booktitle = {Theory of Cryptography - 14th International Conference, {TCC} 2016-B, Beijing, China, October 31 - November 3, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9986}, pages = {3--30}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53644-5\_1}, doi = {10.1007/978-3-662-53644-5\_1}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/AnanthCCLL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/LinPST16, author = {Huijia Lin and Rafael Pass and Karn Seth and Sidharth Telang}, editor = {Eyal Kushilevitz and Tal Malkin}, title = {Output-Compressing Randomized Encodings and Applications}, booktitle = {Theory of Cryptography - 13th International Conference, {TCC} 2016-A, Tel Aviv, Israel, January 10-13, 2016, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9562}, pages = {96--124}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-49096-9\_5}, doi = {10.1007/978-3-662-49096-9\_5}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/LinPST16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/ChenLT16, author = {Binyi Chen and Huijia Lin and Stefano Tessaro}, editor = {Eyal Kushilevitz and Tal Malkin}, title = {Oblivious Parallel {RAM:} Improved Efficiency and Generic Constructions}, booktitle = {Theory of Cryptography - 13th International Conference, {TCC} 2016-A, Tel Aviv, Israel, January 10-13, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9563}, pages = {205--234}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-49099-0\_8}, doi = {10.1007/978-3-662-49099-0\_8}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/tcc/ChenLT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LinPST16, author = {Huijia Lin and Rafael Pass and Karn Seth and Sidharth Telang}, title = {Indistinguishability Obfuscation with Non-trivial Efficiency}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {6}, year = {2016}, url = {http://eprint.iacr.org/2016/006}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LinPST16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Lin16, author = {Huijia Lin}, title = {Indistinguishability Obfuscation from Constant-Degree Graded Encoding Schemes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {257}, year = {2016}, url = {http://eprint.iacr.org/2016/257}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Lin16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LinV16, author = {Huijia Lin and Vinod Vaikuntanathan}, title = {Indistinguishability Obfuscation from DDH-like Assumptions on Constant-Degree Graded Encodings}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {795}, year = {2016}, url = {http://eprint.iacr.org/2016/795}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LinV16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BitanskyLP16, author = {Nir Bitansky and Huijia Lin and Omer Paneth}, title = {On Removing Graded Encodings from Functional Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {962}, year = {2016}, url = {http://eprint.iacr.org/2016/962}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BitanskyLP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Lin16a, author = {Huijia Lin}, title = {Indistinguishability Obfuscation from {DDH} on 5-linear Maps and Locality-5 PRGs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1096}, year = {2016}, url = {http://eprint.iacr.org/2016/1096}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Lin16a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jacm/LinP15, author = {Huijia Lin and Rafael Pass}, title = {Constant-Round Nonmalleable Commitments from Any One-Way Function}, journal = {J. {ACM}}, volume = {62}, number = {1}, pages = {5:1--5:30}, year = {2015}, url = {https://doi.org/10.1145/2699446}, doi = {10.1145/2699446}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jacm/LinP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/ChungLP15, author = {Kai{-}Min Chung and Huijia Lin and Rafael Pass}, editor = {Rosario Gennaro and Matthew Robshaw}, title = {Constant-Round Concurrent Zero-Knowledge from Indistinguishability Obfuscation}, booktitle = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9215}, pages = {287--307}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-47989-6\_14}, doi = {10.1007/978-3-662-47989-6\_14}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/ChungLP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/innovations/DinurGL15, author = {Irit Dinur and Shafi Goldwasser and Huijia Lin}, editor = {Tim Roughgarden}, title = {The Computational Benefit of Correlated Instances}, booktitle = {Proceedings of the 2015 Conference on Innovations in Theoretical Computer Science, {ITCS} 2015, Rehovot, Israel, January 11-13, 2015}, pages = {219--228}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2688073.2688082}, doi = {10.1145/2688073.2688082}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/innovations/DinurGL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stoc/BitanskyGLPT15, author = {Nir Bitansky and Sanjam Garg and Huijia Lin and Rafael Pass and Sidharth Telang}, editor = {Rocco A. Servedio and Ronitt Rubinfeld}, title = {Succinct Randomized Encodings and their Applications}, booktitle = {Proceedings of the Forty-Seventh Annual {ACM} on Symposium on Theory of Computing, {STOC} 2015, Portland, OR, USA, June 14-17, 2015}, pages = {439--448}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2746539.2746574}, doi = {10.1145/2746539.2746574}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/stoc/BitanskyGLPT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/GoyalLPPS15, author = {Vipul Goyal and Huijia Lin and Omkant Pandey and Rafael Pass and Amit Sahai}, editor = {Yevgeniy Dodis and Jesper Buus Nielsen}, title = {Round-Efficient Concurrently Composable Secure Computation via a Robust Extraction Lemma}, booktitle = {Theory of Cryptography - 12th Theory of Cryptography Conference, {TCC} 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9014}, pages = {260--289}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46494-6\_12}, doi = {10.1007/978-3-662-46494-6\_12}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/GoyalLPPS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/CanettiLTV15, author = {Ran Canetti and Huijia Lin and Stefano Tessaro and Vinod Vaikuntanathan}, editor = {Yevgeniy Dodis and Jesper Buus Nielsen}, title = {Obfuscation of Probabilistic Circuits and Applications}, booktitle = {Theory of Cryptography - 12th Theory of Cryptography Conference, {TCC} 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9015}, pages = {468--497}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46497-7\_19}, doi = {10.1007/978-3-662-46497-7\_19}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/CanettiLTV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BitanskyGLPT15, author = {Nir Bitansky and Sanjam Garg and Huijia Lin and Rafael Pass and Sidharth Telang}, title = {Succinct Randomized Encodings and their Applications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {356}, year = {2015}, url = {http://eprint.iacr.org/2015/356}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BitanskyGLPT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LinPST15, author = {Huijia Lin and Rafael Pass and Karn Seth and Sidharth Telang}, title = {Output-Compressing Randomized Encodings and Applications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {720}, year = {2015}, url = {http://eprint.iacr.org/2015/720}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LinPST15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChenLT15, author = {Binyi Chen and Huijia Lin and Stefano Tessaro}, title = {Oblivious Parallel {RAM:} Improved Efficiency and Generic Constructions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1053}, year = {2015}, url = {http://eprint.iacr.org/2015/1053}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChenLT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AnanthCCLL15, author = {Prabhanjan Ananth and Yu{-}Chi Chen and Kai{-}Min Chung and Huijia Lin and Wei{-}Kai Lin}, title = {Delegating {RAM} Computations with Adaptive Soundness and Privacy}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1082}, year = {2015}, url = {http://eprint.iacr.org/2015/1082}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AnanthCCLL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BitanskyDL14, author = {Nir Bitansky and Dana Dachman{-}Soled and Huijia Lin}, editor = {Juan A. Garay and Rosario Gennaro}, title = {Leakage-Tolerant Computation with Input-Independent Preprocessing}, booktitle = {Advances in Cryptology - {CRYPTO} 2014 - 34th Annual Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {8617}, pages = {146--163}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-44381-1\_9}, doi = {10.1007/978-3-662-44381-1\_9}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BitanskyDL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eccc/DinurGL14, author = {Irit Dinur and Shafi Goldwasser and Huijia Lin}, title = {The Computational Benefit of Correlated Instances}, journal = {Electron. Colloquium Comput. Complex.}, volume = {{TR14-083}}, year = {2014}, url = {https://eccc.weizmann.ac.il/report/2014/083}, eprinttype = {ECCC}, eprint = {TR14-083}, timestamp = {Tue, 27 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eccc/DinurGL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BitanskyCCGLRT14, author = {Nir Bitansky and Ran Canetti and Alessandro Chiesa and Shafi Goldwasser and Huijia Lin and Aviad Rubinstein and Eran Tromer}, title = {The Hunting of the {SNARK}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {580}, year = {2014}, url = {http://eprint.iacr.org/2014/580}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BitanskyCCGLRT14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LinP14, author = {Huijia Lin and Rafael Pass}, title = {Succinct Garbling Schemes and Applications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {766}, year = {2014}, url = {http://eprint.iacr.org/2014/766}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LinP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CanettiLTV14, author = {Ran Canetti and Huijia Lin and Stefano Tessaro and Vinod Vaikuntanathan}, title = {Obfuscation of Probabilistic Circuits and Applications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {882}, year = {2014}, url = {http://eprint.iacr.org/2014/882}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CanettiLTV14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChungLP14, author = {Kai{-}Min Chung and Huijia Lin and Rafael Pass}, title = {Constant-Round Concurrent Zero-knowledge from Indistinguishability Obfuscation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {991}, year = {2014}, url = {http://eprint.iacr.org/2014/991}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChungLP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/LinT13, author = {Huijia Lin and Stefano Tessaro}, editor = {Thomas Johansson and Phong Q. Nguyen}, title = {Amplification of Chosen-Ciphertext Security}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2013, 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Athens, Greece, May 26-30, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7881}, pages = {503--519}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-38348-9\_30}, doi = {10.1007/978-3-642-38348-9\_30}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/LinT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/focs/ChungLP13, author = {Kai{-}Min Chung and Huijia Lin and Rafael Pass}, title = {Constant-Round Concurrent Zero Knowledge from P-Certificates}, booktitle = {54th Annual {IEEE} Symposium on Foundations of Computer Science, {FOCS} 2013, 26-29 October, 2013, Berkeley, CA, {USA}}, pages = {50--59}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/FOCS.2013.14}, doi = {10.1109/FOCS.2013.14}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/focs/ChungLP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/focs/CanettiLP13, author = {Ran Canetti and Huijia Lin and Rafael Pass}, title = {From Unprovability to Environmentally Friendly Protocols}, booktitle = {54th Annual {IEEE} Symposium on Foundations of Computer Science, {FOCS} 2013, 26-29 October, 2013, Berkeley, CA, {USA}}, pages = {70--79}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/FOCS.2013.16}, doi = {10.1109/FOCS.2013.16}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/focs/CanettiLP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/innovations/ChungLMP13, author = {Kai{-}Min Chung and Huijia Lin and Mohammad Mahmoody and Rafael Pass}, editor = {Robert D. Kleinberg}, title = {On the power of nonuniformity in proofs of security}, booktitle = {Innovations in Theoretical Computer Science, {ITCS} '13, Berkeley, CA, USA, January 9-12, 2013}, pages = {389--400}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2422436.2422480}, doi = {10.1145/2422436.2422480}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/innovations/ChungLMP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/CanettiLP13, author = {Ran Canetti and Huijia Lin and Omer Paneth}, editor = {Amit Sahai}, title = {Public-Coin Concurrent Zero-Knowledge in the Global Hash Model}, booktitle = {Theory of Cryptography - 10th Theory of Cryptography Conference, {TCC} 2013, Tokyo, Japan, March 3-6, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7785}, pages = {80--99}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-36594-2\_5}, doi = {10.1007/978-3-642-36594-2\_5}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/tcc/CanettiLP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/us/Lin12, author = {Huijia Lin}, title = {Concurrent Security}, school = {Cornell University, {USA}}, year = {2012}, timestamp = {Fri, 01 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/phd/us/Lin12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/PassLV12, author = {Rafael Pass and Huijia Lin and Muthuramakrishnan Venkitasubramaniam}, editor = {Xiaoyun Wang and Kazue Sako}, title = {A Unified Framework for {UC} from Only {OT}}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2012 - 18th International Conference on the Theory and Application of Cryptology and Information Security, Beijing, China, December 2-6, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7658}, pages = {699--717}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34961-4\_42}, doi = {10.1007/978-3-642-34961-4\_42}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/PassLV12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/LinP12, author = {Huijia Lin and Rafael Pass}, editor = {Reihaneh Safavi{-}Naini and Ran Canetti}, title = {Black-Box Constructions of Composable Protocols without Set-Up}, booktitle = {Advances in Cryptology - {CRYPTO} 2012 - 32nd Annual Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7417}, pages = {461--478}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-32009-5\_27}, doi = {10.1007/978-3-642-32009-5\_27}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/LinP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChungLP12, author = {Kai{-}Min Chung and Huijia Lin and Rafael Pass}, title = {Constant-Round Concurrent Zero Knowledge From Falsifiable Assumptions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {563}, year = {2012}, url = {http://eprint.iacr.org/2012/563}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChungLP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stoc/LinP11, author = {Huijia Lin and Rafael Pass}, editor = {Lance Fortnow and Salil P. Vadhan}, title = {Constant-round non-malleable commitments from any one-way function}, booktitle = {Proceedings of the 43rd {ACM} Symposium on Theory of Computing, {STOC} 2011, San Jose, CA, USA, 6-8 June 2011}, pages = {705--714}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/1993636.1993730}, doi = {10.1145/1993636.1993730}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/stoc/LinP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/HaleviL11, author = {Shai Halevi and Huijia Lin}, editor = {Yuval Ishai}, title = {After-the-Fact Leakage in Public-Key Encryption}, booktitle = {Theory of Cryptography - 8th Theory of Cryptography Conference, {TCC} 2011, Providence, RI, USA, March 28-30, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6597}, pages = {107--124}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-19571-6\_8}, doi = {10.1007/978-3-642-19571-6\_8}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/tcc/HaleviL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/LinP11, author = {Huijia Lin and Rafael Pass}, editor = {Yuval Ishai}, title = {Concurrent Non-Malleable Zero Knowledge with Adaptive Inputs}, booktitle = {Theory of Cryptography - 8th Theory of Cryptography Conference, {TCC} 2011, Providence, RI, USA, March 28-30, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6597}, pages = {274--292}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-19571-6\_17}, doi = {10.1007/978-3-642-19571-6\_17}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/LinP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HaleviL11, author = {Shai Halevi and Huijia Lin}, title = {After-the-Fact Leakage in Public-Key Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {11}, year = {2011}, url = {http://eprint.iacr.org/2011/011}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HaleviL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GoldwasserLR11, author = {Shafi Goldwasser and Huijia Lin and Aviad Rubinstein}, title = {Delegation of Computation without Rejection Problem from Designated Verifier CS-Proofs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {456}, year = {2011}, url = {http://eprint.iacr.org/2011/456}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GoldwasserLR11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/LinPTV10, author = {Huijia Lin and Rafael Pass and Wei{-}Lung Dustin Tseng and Muthuramakrishnan Venkitasubramaniam}, editor = {Tal Rabin}, title = {Concurrent Non-Malleable Zero Knowledge Proofs}, booktitle = {Advances in Cryptology - {CRYPTO} 2010, 30th Annual Cryptology Conference, Santa Barbara, CA, USA, August 15-19, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6223}, pages = {429--446}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14623-7\_23}, doi = {10.1007/978-3-642-14623-7\_23}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/LinPTV10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/focs/CanettiLP10, author = {Ran Canetti and Huijia Lin and Rafael Pass}, title = {Adaptive Hardness and Composable Security in the Plain Model from Standard Assumptions}, booktitle = {51th Annual {IEEE} Symposium on Foundations of Computer Science, {FOCS} 2010, October 23-26, 2010, Las Vegas, Nevada, {USA}}, pages = {541--550}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/FOCS.2010.86}, doi = {10.1109/FOCS.2010.86}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/focs/CanettiLP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LinP10, author = {Huijia Lin and Rafael Pass}, title = {Constant-round Non-Malleable Commitments from Any One-Way Function}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {483}, year = {2010}, url = {http://eprint.iacr.org/2010/483}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LinP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stoc/LinPV09, author = {Huijia Lin and Rafael Pass and Muthuramakrishnan Venkitasubramaniam}, editor = {Michael Mitzenmacher}, title = {A unified framework for concurrent security: universal composability from stand-alone non-malleability}, booktitle = {Proceedings of the 41st Annual {ACM} Symposium on Theory of Computing, {STOC} 2009, Bethesda, MD, USA, May 31 - June 2, 2009}, pages = {179--188}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1536414.1536441}, doi = {10.1145/1536414.1536441}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/stoc/LinPV09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stoc/LinP09, author = {Huijia Lin and Rafael Pass}, editor = {Michael Mitzenmacher}, title = {Non-malleability amplification}, booktitle = {Proceedings of the 41st Annual {ACM} Symposium on Theory of Computing, {STOC} 2009, Bethesda, MD, USA, May 31 - June 2, 2009}, pages = {189--198}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1536414.1536442}, doi = {10.1145/1536414.1536442}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/stoc/LinP09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ipsn/LinLMGG08, author = {Huijia Lin and Maohua Lu and Nikola Milosavljevic and Jie Gao and Leonidas J. Guibas}, title = {Composable Information Gradients in Wireless Sensor Networks}, booktitle = {Proceedings of the 7th International Conference on Information Processing in Sensor Networks, {IPSN} 2008, St. Louis, Missouri, USA, April 22-24, 2008}, pages = {121--132}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/IPSN.2008.21}, doi = {10.1109/IPSN.2008.21}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ipsn/LinLMGG08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/LinPV08, author = {Huijia Lin and Rafael Pass and Muthuramakrishnan Venkitasubramaniam}, editor = {Ran Canetti}, title = {Concurrent Non-malleable Commitments from Any One-Way Function}, booktitle = {Theory of Cryptography, Fifth Theory of Cryptography Conference, {TCC} 2008, New York, USA, March 19-21, 2008}, series = {Lecture Notes in Computer Science}, volume = {4948}, pages = {571--588}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-78524-8\_31}, doi = {10.1007/978-3-540-78524-8\_31}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/LinPV08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/BrumleySCJL07, author = {David Brumley and Dawn Xiaodong Song and Tzi{-}cker Chiueh and Rob Johnson and Huijia Lin}, title = {{RICH:} Automatically Protecting Against Integer-Based Vulnerabilities}, booktitle = {Proceedings of the Network and Distributed System Security Symposium, {NDSS} 2007, San Diego, California, USA, 28th February - 2nd March 2007}, publisher = {The Internet Society}, year = {2007}, url = {https://www.ndss-symposium.org/ndss2007/rich-automatically-protecting-against-integer-based-vulnerabilities/}, timestamp = {Mon, 01 Feb 2021 08:42:16 +0100}, biburl = {https://dblp.org/rec/conf/ndss/BrumleySCJL07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.