Follow
Ling Ren
Title
Cited by
Cited by
Year
Path oram: An extremely simple oblivious ram protocol
E Stefanov, M Van Dijk, E Shi, C Fletcher, L Ren, X Yu, S Devadas
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
1186*2013
Constants Count: Practical Improvements to Oblivious RAM
L Ren, CW Fletcher, A Kwon, E Stefanov, E Shi, M van Dijk, S Devadas
24th USENIX Security Symposium (USENIX Security 2015), 2015
277*2015
Synchronous byzantine agreement with expected O(1) rounds, expected O(n2) communication, and optimal resilience
I Abraham, S Devadas, D Dolev, K Nayak, L Ren
Financial Cryptography and Data Security (FC), 2019
232*2019
Onion ORAM: a constant bandwidth blowup oblivious RAM
S Devadas, M van Dijk, CW Fletcher, L Ren, E Shi, D Wichs
Theory of Cryptography Conference, 145-174, 2016
2042016
Sync hotstuff: Simple and practical synchronous state machine replication
I Abraham, D Malkhi, K Nayak, L Ren, M Yin
2020 IEEE Symposium on Security and Privacy (SP), 106-118, 2020
1812020
Design space exploration and optimization of path oblivious ram in secure processors
L Ren, X Yu, CW Fletcher, M Van Dijk, S Devadas
Proceedings of the 40th Annual International Symposium on Computer …, 2013
1692013
Solida: A blockchain protocol based on reconfigurable byzantine consensus
I Abraham, D Malkhi, K Nayak, L Ren, A Spiegelman
arXiv preprint arXiv:1612.02916, 2016
1672016
Freecursive oram: [nearly] free recursion and integrity verification for position-based oblivious ram
CW Fletcher, L Ren, A Kwon, M van Dijk, S Devadas
Proceedings of the Twentieth International Conference on Architectural …, 2015
136*2015
Communication complexity of byzantine agreement, revisited
I Abraham, TH Chan, D Dolev, K Nayak, R Pass, L Ren, E Shi
Proceedings of the 2019 ACM Symposium on Principles of Distributed Computing …, 2019
1232019
Suppressing the oblivious ram timing channel while making information leakage and program efficiency trade-offs
CW Fletchery, L Ren, X Yu, M Van Dijk, O Khan, S Devadas
2014 IEEE 20th International Symposium on High Performance Computer …, 2014
1222014
Trapdoor Computational Fuzzy Extractors and Stateless Cryptographically-Secure Physical Unclonable Functions
C Herder, L Ren, M van Dijk, MDM Yu, S Devadas
1192015
Solidus: An incentive-compatible cryptocurrency based on permissionless byzantine consensus
I Abraham, D Malkhi, K Nayak, L Ren, A Spiegelman
CoRR, abs/1612.02916, 2016
1172016
Flexible byzantine fault tolerance
D Malkhi, K Nayak, L Ren
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019
1112019
Analysis of Nakamoto Consensus
L Ren
Cryptology ePrint Archive, Report 2019/943.(2019). https://eprint. iacr. org …, 2019
962019
GPU-accelerated sparse LU factorization for circuit simulation with performance modeling
X Chen, L Ren, Y Wang, H Yang
IEEE Transactions on Parallel and Distributed Systems 26 (3), 786-795, 2014
882014
Good-case latency of byzantine broadcast: A complete categorization
I Abraham, K Nayak, L Ren, Z Xiang
Proceedings of the 2021 ACM Symposium on Principles of Distributed Computing …, 2021
87*2021
A low-latency, low-area hardware oblivious ram controller
CW Fletcher, L Ren, A Kwon, M Van Dijk, E Stefanov, D Serpanos, ...
Field-Programmable Custom Computing Machines (FCCM), 2015 IEEE 23rd Annual …, 2015
87*2015
Improved Extension Protocols for Byzantine Broadcast and Agreement
K Nayak, L Ren, E Shi, NH Vaidya, Z Xiang
arXiv preprint arXiv:2002.11321, 2020
812020
Proof of space from stacked expanders
L Ren, S Devadas
Theory of Cryptography Conference, 262-285, 2016
772016
Practical asynchronous distributed key generation
S Das, T Yurek, Z Xiang, A Miller, L Kokoris-Kogias, L Ren
2022 IEEE Symposium on Security and Privacy (SP), 2518-2534, 2022
712022
The system can't perform the operation now. Try again later.
Articles 1–20