Ling Ren
Title
Cited by
Cited by
Year
Path oram: An extremely simple oblivious ram protocol
E Stefanov, M Van Dijk, E Shi, C Fletcher, L Ren, X Yu, S Devadas
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
7542013
Constants Count: Practical Improvements to Oblivious RAM
L Ren, CW Fletcher, A Kwon, E Stefanov, E Shi, M van Dijk, S Devadas
24th USENIX Security Symposium (USENIX Security 2015), 2015
177*2015
Onion ORAM: a constant bandwidth blowup oblivious RAM
S Devadas, M van Dijk, CW Fletcher, L Ren, E Shi, D Wichs
Theory of Cryptography Conference, 145-174, 2016
1472016
Solida: A Blockchain Protocol Based on Reconfigurable Byzantine Consensus
I Abraham, D Malkhi, K Nayak, L Ren, A Spiegelman
LIPIcs-Leibniz International Proceedings in Informatics 95, 2018
126*2018
Design space exploration and optimization of path oblivious ram in secure processors
L Ren, X Yu, CW Fletcher, M Van Dijk, S Devadas
Proceedings of the 40th Annual International Symposium on Computer …, 2013
1262013
Freecursive oram: [nearly] free recursion and integrity verification for position-based oblivious ram
CW Fletcher, L Ren, A Kwon, M van Dijk, S Devadas
Proceedings of the Twentieth International Conference on Architectural …, 2015
97*2015
Suppressing the oblivious ram timing channel while making information leakage and program efficiency trade-offs
CW Fletchery, L Ren, X Yu, M Van Dijk, O Khan, S Devadas
2014 IEEE 20th International Symposium on High Performance Computer …, 2014
912014
Synchronous byzantine agreement with expected O (1) rounds, expected O (n2) communication, and optimal resilience
I Abraham, S Devadas, D Dolev, K Nayak, L Ren
Financial Cryptography and Data Security (FC), 2019
83*2019
A low-latency, low-area hardware oblivious ram controller
CW Fletcher, L Ren, A Kwon, M Van Dijk, E Stefanov, D Serpanos, ...
Field-Programmable Custom Computing Machines (FCCM), 2015 IEEE 23rd Annual …, 2015
66*2015
Trapdoor Computational Fuzzy Extractors and Stateless Cryptographically-Secure Physical Unclonable Functions
C Herder, L Ren, M van Dijk, MDM Yu, S Devadas
66*2015
GPU-accelerated sparse LU factorization for circuit simulation with performance modeling
X Chen, L Ren, Y Wang, H Yang
IEEE Transactions on Parallel and Distributed Systems 26 (3), 786-795, 2015
632015
Integrity verification for path oblivious-ram
L Ren, CW Fletcher, X Yu, M Van Dijk, S Devadas
2013 IEEE High Performance Extreme Computing Conference (HPEC), 1-6, 2013
482013
Bucket ORAM: Single Online Roundtrip, Constant Bandwidth Oblivious RAM.
CW Fletcher, M Naveed, L Ren, E Shi, E Stefanov
IACR Cryptology ePrint Archive 2015, 1065, 2015
472015
HOP: hardware makes obfuscation practical
K Nayak, CW Fletcher, L Ren, N Chandran, S Lokam, E Shi, V Goyal
24th Annual Network and Distributed System Security Symposium, NDSS, 2017
442017
Sparse LU factorization for parallel circuit simulation on GPU
L Ren, X Chen, Y Wang, C Zhang, H Yang
Proceedings of the 49th Annual Design Automation Conference, 1125-1130, 2012
402012
Proof of space from stacked expanders
L Ren, S Devadas
Theory of Cryptography Conference, 262-285, 2016
39*2016
PrORAM: dynamic prefetcher for oblivious RAM
X Yu, SK Haider, L Ren, C Fletcher, A Kwon, M van Dijk, S Devadas
Proceedings of the 42nd Annual International Symposium on Computer …, 2015
39*2015
Communication complexity of byzantine agreement, revisited
I Abraham, TH Chan, D Dolev, K Nayak, R Pass, L Ren, E Shi
Proceedings of the 2019 ACM Symposium on Principles of Distributed Computing …, 2019
28*2019
Asymptotically Tight Bounds for Composing ORAM with PIR
I Abraham, CW Fletcher, K Nayak, B Pinkas, L Ren
IACR International Workshop on Public Key Cryptography, 91-120, 2017
282017
A hybrid CPU-GPU accelerated framework for fast mapping of high-resolution human brain connectome
Y Wang, H Du, M Xia, L Ren, M Xu, T Xie, G Gong, N Xu, H Yang, Y He
PloS one 8 (5), 2013
282013
The system can't perform the operation now. Try again later.
Articles 1–20