How to efficiently evaluate RAM programs with malicious security A Afshar, Z Hu, P Mohassel, M Rosulek Annual International Conference on the Theory and Applications of …, 2015 | 47 | 2015 |
Efficient zero-knowledge proofs of non-algebraic statements with sublinear amortized cost Z Hu, P Mohassel, M Rosulek Advances in Cryptology--CRYPTO 2015: 35th Annual Cryptology Conference …, 2015 | 29 | 2015 |
Toward a Resilient Key Exchange Protocol for IoT Z Hu, J Li, S Mergendahl, C Wilson Proceedings of the Twelfth ACM Conference on Data and Application Security …, 2022 | 3 | 2022 |
Layered Network Protocols for Secure Communications in the Internet of Things Z Hu University of Oregon: Eugene, OR, USA, 2021 | 2 | 2021 |
Resilient Intermediary-Based Key Exchange Protocol for IoT Z Hu, J Li, C Wilson ACM Transactions on Internet of Things 5 (1), 1-31, 2024 | 1 | 2024 |
Cryptography, Dependability and Privacy in Decentralized Systems Z Hu University of Oregon, 2023 | | 2023 |
Improved Blind Seer System With Constant Communication Rounds Z Hu | | 2017 |
Random access machine in secure multi-party computation Z Hu | | 2015 |