TimeClave: Oblivious In-enclave Time series Processing SystemInternational Conference on Information, Communications and Signal Processing (ICICS), 2023 |
Cuckoo Hashing in Cryptography: Optimal Parameters, Robustness and
ApplicationsIACR Cryptology ePrint Archive (IACR ePrint), 2023 |
Single Round-trip Hierarchical ORAM via Succinct IndicesACM Asia Conference on Computer and Communications Security (AsiaCCS), 2022 |
Dynamic Local Searchable Symmetric EncryptionIACR Cryptology ePrint Archive (IACR ePrint), 2022 |
A Double-Edged Sword: Security Threats and Opportunities in One-Sided
Network CommunicationUSENIX Workshop on Hot Topics in Cloud Computing (HotCloud), 2019 |
An Algorithmic Framework For Differentially Private Data Analysis on
Trusted ProcessorsNeural Information Processing Systems (NeurIPS), 2018 |
The Melbourne Shuffle: Improving Oblivious Storage in the CloudInternational Colloquium on Automata, Languages and Programming (ICALP), 2014 |
Statistically-secure ORAM with OverheadInternational Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT), 2013 |
Oblivious RAM Simulation with Efficient Worst-Case Access OverheadCloud Computing Security Workshop (CCS), 2011 |
Towards Practical Oblivious RAMNetwork and Distributed System Security Symposium (NDSS), 2011 |
Privacy-Preserving Group Data Access via Stateless Oblivious RAM
SimulationACM-SIAM Symposium on Discrete Algorithms (SODA), 2011 |