Follow
Huijia (Rachel) Lin
Huijia (Rachel) Lin
Associate Professor at the University of Washington
Verified email at cs.washington.edu - Homepage
Title
Cited by
Cited by
Year
RICH: Automatically protecting against integer-based vulnerabilities
D Brumley, T Chiueh, R Johnson, H Lin, D Song
Carnegie Mellon University, 2007
1532007
The hunting of the SNARK
N Bitansky, R Canetti, A Chiesa, S Goldwasser, H Lin, A Rubinstein, ...
Journal of Cryptology 30 (4), 989-1066, 2017
1382017
Indistinguishability obfuscation from SXDH on 5-linear maps and locality-5 PRGs
H Lin
Advances in Cryptology–CRYPTO 2017: 37th Annual International Cryptology …, 2017
1362017
Obfuscation of probabilistic circuits and applications
R Canetti, H Lin, S Tessaro, V Vaikuntanathan
Cryptology ePrint Archive, 2014
1342014
Indistinguishability obfuscation from well-founded assumptions
A Jain, H Lin, A Sahai
Proceedings of the 53rd Annual ACM SIGACT Symposium on Theory of Computing …, 2021
1312021
Succinct randomized encodings and their applications
N Bitansky, S Garg, H Lin, R Pass, S Telang
Proceedings of the forty-seventh annual ACM symposium on Theory of computing …, 2015
1312015
Succinct randomized encodings and their applications
N Bitansky, S Garg, H Lin, R Pass, S Telang
Proceedings of the forty-seventh annual ACM symposium on Theory of computing …, 2015
1312015
Indistinguishability obfuscation from DDH-like assumptions on constant-degree graded encodings
H Lin, V Vaikuntanathan
2016 IEEE 57th Annual Symposium on Foundations of Computer Science (FOCS), 11-20, 2016
1292016
Indistinguishability obfuscation from constant-degree graded encoding schemes
H Lin
Advances in Cryptology–EUROCRYPT 2016: 35th Annual International Conference …, 2016
1292016
Indistinguishability obfuscation from trilinear maps and block-wise local PRGs
H Lin, S Tessaro
Advances in Cryptology–CRYPTO 2017: 37th Annual International Cryptology …, 2017
1222017
Concurrent non-malleable commitments from any one-way function
H Lin, R Pass, M Venkitasubramaniam
Theory of Cryptography: Fifth Theory of Cryptography Conference, TCC 2008 …, 2008
1182008
Adaptive hardness and composable security in the plain model from standard assumptions
R Canetti, H Lin, R Pass
2010 IEEE 51st Annual Symposium on Foundations of Computer Science, 541-550, 2010
1132010
A unified framework for concurrent security: universal composability from stand-alone non-malleability
H Lin, R Pass, M Venkitasubramaniam
Proceedings of the forty-first annual ACM symposium on Theory of computing …, 2009
1132009
After-the-fact leakage in public-key encryption
S Halevi, H Lin
Theory of Cryptography, 107-124, 2011
1082011
Delegation of computation without rejection problem from designated verifier CS-proofs
S Goldwasser, H Lin, A Rubinstein
Cryptology ePrint Archive, 2011
1012011
Constant-round non-malleable commitments from any one-way function
H Lin, R Pass
Proceedings of the 43rd annual ACM symposium on Theory of computing, 705-714, 2011
922011
Taostore: Overcoming asynchronicity in oblivious data storage
C Sahin, V Zakhary, A El Abbadi, H Lin, S Tessaro
2016 IEEE Symposium on Security and Privacy (SP), 198-217, 2016
912016
Composable information gradients in wireless sensor networks
H Lin, M Lu, N Milosavljevic, J Gao, LJ Guibas
2008 International Conference on Information Processing in Sensor Networks …, 2008
742008
Non-malleability amplification
H Lin, R Pass
Proceedings of the forty-first annual ACM symposium on Theory of computing …, 2009
712009
Foundations of homomorphic secret sharing
E Boyle, N Gilboa, Y Ishai, H Lin, S Tessaro
Cryptology ePrint Archive, 2017
682017
The system can't perform the operation now. Try again later.
Articles 1–20