Huijia Lin
Huijia Lin
Assistant Professor at UCSB
Verified email at cs.ucsb.edu - Homepage
Title
Cited by
Cited by
Year
RICH: Automatically protecting against integer-based vulnerabilities
D Brumley, T Chiueh, R Johnson, H Lin, D Song
Carnegie Mellon University, 2007
1242007
After-the-fact leakage in public-key encryption
S Halevi, H Lin
Theory of Cryptography, 107-124, 2011
1022011
Succinct randomized encodings and their applications
N Bitansky, S Garg, H Lin, R Pass, S Telang
Proceedings of the forty-seventh annual ACM symposium on Theory of computing …, 2015
1012015
Succinct randomized encodings and their applications
N Bitansky, S Garg, H Lin, R Pass, S Telang
Proceedings of the forty-seventh annual ACM symposium on Theory of computing …, 2015
1012015
A unified framework for concurrent security: universal composability from stand-alone non-malleability
H Lin, R Pass, M Venkitasubramaniam
Proceedings of the forty-first annual ACM symposium on Theory of computing …, 2009
952009
Obfuscation of probabilistic circuits and applications
R Canetti, H Lin, S Tessaro, V Vaikuntanathan
Theory of Cryptography Conference, 468-497, 2015
882015
Delegation of Computation without Rejection Problem from Designated Verifier CS-Proofs.
S Goldwasser, H Lin, A Rubinstein
IACR Cryptology ePrint Archive 2011, 456, 2011
852011
Indistinguishability obfuscation from DDH-like assumptions on constant-degree graded encodings
H Lin, V Vaikuntanathan
2016 IEEE 57th Annual Symposium on Foundations of Computer Science (FOCS), 11-20, 2016
832016
Indistinguishability obfuscation from constant-degree graded encoding schemes
H Lin
Annual International Conference on the Theory and Applications of …, 2016
822016
Adaptive hardness and composable security in the plain model from standard assumptions
R Canetti, H Lin, R Pass
2010 IEEE 51st Annual Symposium on Foundations of Computer Science, 541-550, 2010
822010
The hunting of the SNARK
N Bitansky, R Canetti, A Chiesa, S Goldwasser, H Lin, A Rubinstein, ...
Journal of Cryptology 30 (4), 989-1066, 2017
802017
Concurrent non-malleable commitments from any one-way function
H Lin, R Pass, M Venkitasubramaniam
Theory of Cryptography Conference, 571-588, 2008
772008
Indistinguishability obfuscation from SXDH on 5-linear maps and locality-5 PRGs
H Lin
Annual International Cryptology Conference, 599-629, 2017
732017
Composable information gradients in wireless sensor networks
H Lin, M Lu, N Milosavljevic, J Gao, LJ Guibas
2008 International Conference on Information Processing in Sensor Networks …, 2008
732008
Indistinguishability obfuscation from trilinear maps and block-wise local PRGs
H Lin, S Tessaro
Annual International Cryptology Conference, 630-660, 2017
722017
Constant-round non-malleable commitments from any one-way function
H Lin, R Pass
Proceedings of the 43rd annual ACM symposium on Theory of computing, 705-714, 2011
592011
Non-malleability amplification
H Lin, R Pass
Proceedings of the forty-first annual ACM symposium on Theory of computing …, 2009
472009
Oblivious parallel RAM: improved efficiency and generic constructions
B Chen, H Lin, S Tessaro
Theory of Cryptography Conference, 205-234, 2016
452016
Taostore: Overcoming asynchronicity in oblivious data storage
C Sahin, V Zakhary, A El Abbadi, H Lin, S Tessaro
2016 IEEE Symposium on Security and Privacy (SP), 198-217, 2016
442016
Concurrent non-malleable zero knowledge proofs
H Lin, R Pass, WLD Tseng, M Venkitasubramaniam
Annual Cryptology Conference, 429-446, 2010
372010
The system can't perform the operation now. Try again later.
Articles 1–20