Follow
Ling Ren
Title
Cited by
Cited by
Year
Path oram: An extremely simple oblivious ram protocol
E Stefanov, M Van Dijk, E Shi, C Fletcher, L Ren, X Yu, S Devadas
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
1088*2013
Constants Count: Practical Improvements to Oblivious RAM
L Ren, CW Fletcher, A Kwon, E Stefanov, E Shi, M van Dijk, S Devadas
24th USENIX Security Symposium (USENIX Security 2015), 2015
258*2015
Synchronous byzantine agreement with expected O (1) rounds, expected O (n2) communication, and optimal resilience
I Abraham, S Devadas, D Dolev, K Nayak, L Ren
Financial Cryptography and Data Security (FC), 2019
197*2019
Onion ORAM: a constant bandwidth blowup oblivious RAM
S Devadas, M van Dijk, CW Fletcher, L Ren, E Shi, D Wichs
Theory of Cryptography Conference, 145-174, 2016
1952016
Design space exploration and optimization of path oblivious ram in secure processors
L Ren, X Yu, CW Fletcher, M Van Dijk, S Devadas
Proceedings of the 40th Annual International Symposium on Computer …, 2013
1642013
Solida: A blockchain protocol based on reconfigurable byzantine consensus
I Abraham, D Malkhi, K Nayak, L Ren, A Spiegelman
arXiv preprint arXiv:1612.02916, 2016
1482016
Sync hotstuff: Simple and practical synchronous state machine replication
I Abraham, D Malkhi, K Nayak, L Ren, M Yin
2020 IEEE Symposium on Security and Privacy (SP), 106-118, 2020
1332020
Freecursive oram: [nearly] free recursion and integrity verification for position-based oblivious ram
CW Fletcher, L Ren, A Kwon, M van Dijk, S Devadas
Proceedings of the Twentieth International Conference on Architectural …, 2015
130*2015
Suppressing the oblivious ram timing channel while making information leakage and program efficiency trade-offs
CW Fletchery, L Ren, X Yu, M Van Dijk, O Khan, S Devadas
2014 IEEE 20th International Symposium on High Performance Computer …, 2014
1202014
Solidus: An incentive-compatible cryptocurrency based on permissionless byzantine consensus
I Abraham, D Malkhi, K Nayak, L Ren, A Spiegelman
CoRR, abs/1612.02916, 2016
1102016
Trapdoor Computational Fuzzy Extractors and Stateless Cryptographically-Secure Physical Unclonable Functions
C Herder, L Ren, M van Dijk, MDM Yu, S Devadas
1062015
Flexible byzantine fault tolerance
D Malkhi, K Nayak, L Ren
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019
902019
A low-latency, low-area hardware oblivious ram controller
CW Fletcher, L Ren, A Kwon, M Van Dijk, E Stefanov, D Serpanos, ...
Field-Programmable Custom Computing Machines (FCCM), 2015 IEEE 23rd Annual …, 2015
86*2015
Communication complexity of byzantine agreement, revisited
I Abraham, TH Chan, D Dolev, K Nayak, R Pass, L Ren, E Shi
Proceedings of the 2019 ACM Symposium on Principles of Distributed Computing …, 2019
852019
GPU-accelerated sparse LU factorization for circuit simulation with performance modeling
X Chen, L Ren, Y Wang, H Yang
IEEE Transactions on Parallel and Distributed Systems 26 (3), 786-795, 2014
802014
Analysis of Nakamoto Consensus
L Ren
Cryptology ePrint Archive, Report 2019/943.(2019). https://eprint. iacr. org …, 2019
762019
Proof of space from stacked expanders
L Ren, S Devadas
Theory of Cryptography Conference, 262-285, 2016
702016
Bucket ORAM: Single Online Roundtrip, Constant Bandwidth Oblivious RAM.
CW Fletcher, M Naveed, L Ren, E Shi, E Stefanov
IACR Cryptology ePrint Archive 2015, 1065, 2015
632015
Good-case latency of byzantine broadcast: A complete categorization
I Abraham, K Nayak, L Ren, Z Xiang
Proceedings of the 2021 ACM Symposium on Principles of Distributed Computing …, 2021
62*2021
PrORAM: dynamic prefetcher for oblivious RAM
X Yu, SK Haider, L Ren, C Fletcher, A Kwon, M van Dijk, S Devadas
Proceedings of the 42nd Annual International Symposium on Computer …, 2015
62*2015
The system can't perform the operation now. Try again later.
Articles 1–20