What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Ling Ren
Google Scholar
42
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/sp
Verifiable Secret Sharing Simplified.
Sourav Das
Zhuolun Xiang
Alin Tomescu
Alexander Spiegelman
Benny Pinkas
Ling Ren
2025
conf/eurocrypt
Glacius: Threshold Schnorr Signatures from DDH with Full Adaptive Security.
Renas Bacho
Sourav Das
Julian Loss
Ling Ren
2025
conf/eurocrypt
Single-Server Client Preprocessing PIR with Tight Space-Time Trade-Off.
Zhikun Wang
Ling Ren
2025
conf/crypto
Adaptively Secure Three-Round Threshold Schnorr Signatures from DDH.
Renas Bacho
Sourav Das
Julian Loss
Ling Ren
2024
journals/joc
Bandwidth-Hard Functions: Reductions and Lower Bounds.
Jeremiah Blocki
Peiyuan Liu
Ling Ren
Samson Zhou
2024
conf/ccs
Oblivious Single Access Machines - A New Model for Oblivious Computation.
Ananya Appan
David Heath
Ling Ren
2024
conf/ccs
Asynchronous Consensus without Trusted Setup or Public-Key Cryptography.
Sourav Das
Sisi Duan
Shengqi Liu
Atsuki Momose
Ling Ren
Victor Shoup
2024
conf/ccs
Simple and Practical Amortized Sublinear Private Information Retrieval using Dummy Subsets.
Ling Ren
Muhammad Haris Mughees
I Sun
2024
conf/crypto
Adaptively Secure BLS Threshold Signatures from DDH and co-CDH.
Sourav Das
Ling Ren
2024
conf/ndss
Powers of Tau in Asynchrony.
Sourav Das
Zhuolun Xiang
Ling Ren
2023
conf/ccs
ParBFT: Faster Asynchronous BFT Consensus with a Parallel Optimistic Path.
Xiaohai Dai
Bolin Zhang
Hai Jin
Ling Ren
2023
conf/ccs
Threshold Signatures from Inner Product Argument: Succinct, Weighted, and Multi-threshold.
Sourav Das
Philippe Camacho
Zhuolun Xiang
Javier Nieto
Benedikt Bünz
Ling Ren
2023
conf/ccs
On the Security of KZG Commitment for VSS.
Atsuki Momose
Sourav Das
Ling Ren
2023
conf/ccs
Towards Practical Sleepy BFT.
Dahlia Malkhi
Atsuki Momose
Ling Ren
2023
conf/uss
Practical Asynchronous High-threshold Distributed Key Generation and Distributed Polynomial Sampling.
Sourav Das
Zhuolun Xiang
Lefteris Kokoris-Kogias
Ling Ren
2023
conf/crypto
Practical Settlement Bounds for Longest-Chain Consensus.
Peter Gazi
Ling Ren
Alexander Russell
2023
conf/sp
Vectorized Batch Private Information Retrieval.
Muhammad Haris Mughees
Ling Ren
2022
journals/joc
Locality-Preserving Oblivious RAM.
Gilad Asharov
T.-H. Hubert Chan
Kartik Nayak
Rafael Pass
Ling Ren
Elaine Shi
2022
conf/ccs
Constant Latency in Sleepy Consensus.
Atsuki Momose
Ling Ren
2022
conf/ccs
Practical Settlement Bounds for Proof-of-Work Blockchains.
Peter Gazi
Ling Ren
Alexander Russell
2022
conf/sp
Practical Asynchronous Distributed Key Generation.
Sourav Das
Thomas Yurek
Zhuolun Xiang
Andrew Miller
Lefteris Kokoris-Kogias
Ling Ren
2022
conf/sp
Spurt: Scalable Distributed Randomness Beacon with Transparent Setup.
Sourav Das
Vinith Krishnan
Irene Miriam Isaac
Ling Ren
2021
conf/ccs
OnionPIR: Response Efficient Single-Server PIR.
Muhammad Haris Mughees
Hao Chen
Ling Ren
2021
conf/ccs
Asynchronous Data Dissemination and its Applications.
Sourav Das
Zhuolun Xiang
Ling Ren
2021
conf/ccs
Multi-Threshold Byzantine Fault Tolerance.
Atsuki Momose
Ling Ren
2020
conf/ccs
On the Optimality of Optimistic Responsiveness.
Nibesh Shrestha
Ittai Abraham
Ling Ren
Kartik Nayak
2020
conf/sp
Sync HotStuff: Simple and Practical Synchronous State Machine Replication.
Ittai Abraham
Dahlia Malkhi
Kartik Nayak
Ling Ren
Maofan Yin
2019
conf/ccs
Onion Ring ORAM: Efficient Constant Bandwidth Oblivious RAM from (Leveled) TFHE.
Hao Chen
Ilaria Chillotti
Ling Ren
2019
conf/ccs
Flexible Byzantine Fault Tolerance.
Dahlia Malkhi
Kartik Nayak
Ling Ren
2019
conf/fc
Synchronous Byzantine Agreement with Expected O(1) Rounds, Expected O(n<sup>2</sup>) Communication, and Optimal Resilience.
Ittai Abraham
Srinivas Devadas
Danny Dolev
Kartik Nayak
Ling Ren
2019
conf/eurocrypt
Locality-Preserving Oblivious RAM.
Gilad Asharov
T.-H. Hubert Chan
Kartik Nayak
Rafael Pass
Ling Ren
Elaine Shi
2018
conf/ccs
Bandwidth-Hard Functions: Reductions and Lower Bounds.
Jeremiah Blocki
Ling Ren
Samson Zhou
2017
conf/ccs
A Note on the Security of Equihash.
Leo Alcock
Ling Ren
2017
conf/ndss
HOP: Hardware makes Obfuscation Practical.
Kartik Nayak
Christopher W. Fletcher
Ling Ren
Nishanth Chandran
Satya V. Lokam
Elaine Shi
Vipul Goyal
2017
conf/pkc
Asymptotically Tight Bounds for Composing ORAM with PIR.
Ittai Abraham
Christopher W. Fletcher
Kartik Nayak
Benny Pinkas
Ling Ren
2017
conf/tcc
Bandwidth Hard Functions for ASIC Resistance.
Ling Ren
Srinivas Devadas
2017
conf/tcc
On Iterative Collision Search for LPN and Subset Sum.
Srinivas Devadas
Ling Ren
Hanshen Xiao
2016
conf/tcc
Onion ORAM: A Constant Bandwidth Blowup Oblivious RAM.
Srinivas Devadas
Marten van Dijk
Christopher W. Fletcher
Ling Ren
Elaine Shi
Daniel Wichs
2016
conf/tcc
Proof of Space from Stacked Expanders.
Ling Ren
Srinivas Devadas
2015
conf/uss
Constants Count: Practical Improvements to Oblivious RAM.
Ling Ren
Christopher W. Fletcher
Albert Kwon
Emil Stefanov
Elaine Shi
Marten van Dijk
Srinivas Devadas
2013
conf/ccs
Path ORAM: an extremely simple oblivious RAM protocol.
Emil Stefanov
Marten van Dijk
Elaine Shi
Christopher W. Fletcher
Ling Ren
Xiangyao Yu
Srinivas Devadas
2013
conf/ccs
Generalized external interaction with tamper-resistant hardware with bounded information leakage.
Xiangyao Yu
Christopher W. Fletcher
Ling Ren
Marten van Dijk
Srinivas Devadas
Coauthors
Albert Kwon
(1)
Alexander Russell
(2)
Alexander Spiegelman
(1)
Alin Tomescu
(1)
Ananya Appan
(1)
Andrew Miller
(1)
Atsuki Momose
(5)
Benedikt Bünz
(1)
Benny Pinkas
(2)
Bolin Zhang
(1)
Christopher W. Fletcher
(6)
Dahlia Malkhi
(3)
Daniel Wichs
(1)
Danny Dolev
(1)
David Heath
(1)
Elaine Shi
(6)
Emil Stefanov
(2)
Gilad Asharov
(2)
Hai Jin
(1)
Hanshen Xiao
(1)
Hao Chen
(2)
I Sun
(1)
Ilaria Chillotti
(1)
Irene Miriam Isaac
(1)
Ittai Abraham
(4)
Javier Nieto
(1)
Jeremiah Blocki
(2)
Julian Loss
(2)
Kartik Nayak
(8)
Lefteris Kokoris-Kogias
(2)
Leo Alcock
(1)
Ling Ren
(42)
Maofan Yin
(1)
Marten van Dijk
(4)
Muhammad Haris Mughees
(3)
Nibesh Shrestha
(1)
Nishanth Chandran
(1)
Peiyuan Liu
(1)
Peter Gazi
(2)
Philippe Camacho
(1)
Rafael Pass
(2)
Renas Bacho
(2)
Samson Zhou
(2)
Satya V. Lokam
(1)
Shengqi Liu
(1)
Sisi Duan
(1)
Sourav Das
(12)
Srinivas Devadas
(8)
T.-H. Hubert Chan
(2)
Thomas Yurek
(1)
Victor Shoup
(1)
Vinith Krishnan
(1)
Vipul Goyal
(1)
Xiangyao Yu
(2)
Xiaohai Dai
(1)
Zhikun Wang
(1)
Zhuolun Xiang
(6)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to