Follow
Huijia (Rachel) Lin
Huijia (Rachel) Lin
Associate Professor at the University of Washington
Verified email at cs.washington.edu - Homepage
Title
Cited by
Cited by
Year
Indistinguishability obfuscation from well-founded assumptions
A Jain, H Lin, A Sahai
Proceedings of the 53rd Annual ACM SIGACT Symposium on Theory of Computing …, 2021
2712021
The hunting of the SNARK
N Bitansky, R Canetti, A Chiesa, S Goldwasser, H Lin, A Rubinstein, ...
Journal of Cryptology 30 (4), 989-1066, 2017
1912017
Indistinguishability obfuscation from SXDH on 5-linear maps and locality-5 PRGs
H Lin
Annual International Cryptology Conference, 599-629, 2017
1642017
Obfuscation of probabilistic circuits and applications
R Canetti, H Lin, S Tessaro, V Vaikuntanathan
Theory of Cryptography: 12th Theory of Cryptography Conference, TCC 2015 …, 2015
1642015
RICH: Automatically protecting against integer-based vulnerabilities
D Brumley, T Chiueh, R Johnson, H Lin, D Song
Carnegie Mellon University, 2007
1582007
Indistinguishability obfuscation from DDH-like assumptions on constant-degree graded encodings
H Lin, V Vaikuntanathan
2016 IEEE 57th Annual Symposium on Foundations of Computer Science (FOCS), 11-20, 2016
1532016
Indistinguishability obfuscation from constant-degree graded encoding schemes
H Lin
Advances in Cryptology–EUROCRYPT 2016: 35th Annual International Conference …, 2016
1512016
Succinct randomized encodings and their applications
N Bitansky, S Garg, H Lin, R Pass, S Telang
Proceedings of the forty-seventh annual ACM symposium on Theory of computing …, 2015
1502015
Succinct randomized encodings and their applications
N Bitansky, S Garg, H Lin, R Pass, S Telang
Proceedings of the forty-seventh annual ACM symposium on Theory of computing …, 2015
1502015
Indistinguishability obfuscation from trilinear maps and block-wise local PRGs
H Lin, S Tessaro
Annual International Cryptology Conference, 630-660, 2017
1442017
Concurrent non-malleable commitments from any one-way function
H Lin, R Pass, M Venkitasubramaniam
Theory of Cryptography: Fifth Theory of Cryptography Conference, TCC 2008 …, 2008
1242008
Taostore: Overcoming asynchronicity in oblivious data storage
C Sahin, V Zakhary, A El Abbadi, H Lin, S Tessaro
2016 IEEE Symposium on Security and Privacy (SP), 198-217, 2016
1202016
Adaptive hardness and composable security in the plain model from standard assumptions
R Canetti, H Lin, R Pass
2010 IEEE 51st Annual Symposium on Foundations of Computer Science, 541-550, 2010
1172010
A unified framework for concurrent security: universal composability from stand-alone non-malleability
H Lin, R Pass, M Venkitasubramaniam
Proceedings of the forty-first annual ACM symposium on Theory of computing …, 2009
1162009
After-the-fact leakage in public-key encryption
S Halevi, H Lin
Theory of Cryptography, 107-124, 2011
1122011
Delegation of computation without rejection problem from designated verifier CS-proofs
S Goldwasser, H Lin, A Rubinstein
Cryptology ePrint Archive, 2011
1032011
Constant-round non-malleable commitments from any one-way function
H Lin, R Pass
Proceedings of the 43rd annual ACM symposium on Theory of computing, 705-714, 2011
972011
Foundations of homomorphic secret sharing
E Boyle, N Gilboa, Y Ishai, H Lin, S Tessaro
Cryptology ePrint Archive, 2017
862017
Oblivious parallel RAM: improved efficiency and generic constructions
B Chen, H Lin, S Tessaro
Theory of Cryptography: 13th International Conference, TCC 2016-A, Tel Aviv …, 2016
812016
Composable information gradients in wireless sensor networks
H Lin, M Lu, N Milosavljevic, J Gao, LJ Guibas
2008 International Conference on Information Processing in Sensor Networks …, 2008
812008
The system can't perform the operation now. Try again later.
Articles 1–20