| Encoding, fast and slow:{Low-Latency} video processing using thousands of tiny threads S Fouladi, RS Wahby, B Shacklett, KV Balasubramaniam, W Zeng, ... 14th USENIX Symposium on Networked Systems Design and Implementation (NSDI …, 2017 | 484 | 2017 |
| Doubly-efficient zkSNARKs without trusted setup RS Wahby, I Tzialla, A Shelat, J Thaler, M Walfish 2018 IEEE Symposium on Security and Privacy (SP), 926-943, 2018 | 479 | 2018 |
| Pantheon: the training ground for Internet congestion-control research FY Yan, J Ma, GD Hill, D Raghavan, RS Wahby, P Levis, K Winstein 2018 USENIX Annual Technical Conference (USENIX ATC 18), 731-743, 2018 | 347 | 2018 |
| Efficient RAM and control flow in verifiable outsourced computation RS Wahby, S Setty, M Howald, Z Ren, AJ Blumberg, M Walfish Cryptology ePrint Archive, 2014 | 254 | 2014 |
| Salsify:{Low-Latency} network video through tighter integration between a video codec and a transport protocol S Fouladi, J Emmons, E Orbay, C Wu, RS Wahby, K Winstein 15th USENIX Symposium on Networked Systems Design and Implementation (NSDI …, 2018 | 248 | 2018 |
| New architectures for radio-frequency DC–DC power conversion JM Rivas, RS Wahby, JS Shafran, DJ Perreault IEEE Transactions on Power Electronics 21 (2), 380-393, 2006 | 202 | 2006 |
| Brakedown: Linear-time and field-agnostic SNARKs for R1CS A Golovnev, J Lee, S Setty, J Thaler, RS Wahby Annual International Cryptology Conference, 193-226, 2023 | 145 | 2023 |
| Unlocking the lookup singularity with lasso S Setty, J Thaler, R Wahby Annual International Conference on the Theory and Applications of …, 2024 | 127 | 2024 |
| Scaling verifiable computation using efficient set accumulators A Ozdemir, R Wahby, B Whitehat, D Boneh 29th USENIX Security Symposium (USENIX Security 20), 2075-2092, 2020 | 121 | 2020 |
| Fact: a DSL for timing-sensitive computation S Cauligi, G Soeller, B Johannesmeyer, F Brown, RS Wahby, J Renner, ... Proceedings of the 40th ACM SIGPLAN Conference on Programming Language …, 2019 | 120 | 2019 |
| Full accounting for verifiable outsourcing RS Wahby, Y Ji, AJ Blumberg, A Shelat, J Thaler, M Walfish, T Wies Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017 | 115 | 2017 |
| Fast and simple constant-time hashing to the BLS12-381 elliptic curve RS Wahby, D Boneh Cryptology ePrint Archive, 2019 | 100 | 2019 |
| Customizable constraint systems for succinct arguments S Setty, J Thaler, R Wahby Cryptology ePrint Archive, 2023 | 83 | 2023 |
| Pairing-friendly curves Y Sakemi, T Kobayashi, T Saito, RS Wahby IETF Secretariat, 2020 | 81 | 2020 |
| Finding and preventing bugs in javascript bindings F Brown, S Narayan, RS Wahby, D Engler, R Jhala, D Stefan 2017 IEEE Symposium on Security and Privacy (SP), 559-578, 2017 | 81 | 2017 |
| Verifiable asics RS Wahby, M Howald, S Garg, A Shelat, M Walfish 2016 IEEE Symposium on Security and Privacy (SP), 759-778, 2016 | 79 | 2016 |
| Brakedown: Linear-time and post-quantum SNARKs for R1CS. A Golovnev, J Lee, STV Setty, J Thaler, RS Wahby IACR Cryptol. ePrint Arch. 2021, 1043, 2021 | 74 | 2021 |
| Hashing to elliptic curves A Faz-Hernández, S Scott, N Sullivan, RS Wahby, CA Wood Internet Engineering Task Force, Internet-Draft draft-irtf-cfrg-hash-to …, 2021 | 73 | 2021 |
| CirC: Compiler infrastructure for proof systems, software verification, and more A Ozdemir, F Brown, RS Wahby 2022 IEEE Symposium on Security and Privacy (SP), 2248-2266, 2022 | 64 | 2022 |
| Defending against malicious peripherals with Cinch S Angel, RS Wahby, M Howald, JB Leners, M Spilo, Z Sun, AJ Blumberg, ... 25th USENIX Security Symposium (USENIX Security 16), 397-414, 2016 | 57 | 2016 |