[go: up one dir, main page]

Follow
Riad S. Wahby
Riad S. Wahby
Verified email at cmu.edu - Homepage
Title
Cited by
Cited by
Year
Encoding, fast and slow:{Low-Latency} video processing using thousands of tiny threads
S Fouladi, RS Wahby, B Shacklett, KV Balasubramaniam, W Zeng, ...
14th USENIX Symposium on Networked Systems Design and Implementation (NSDI …, 2017
4842017
Doubly-efficient zkSNARKs without trusted setup
RS Wahby, I Tzialla, A Shelat, J Thaler, M Walfish
2018 IEEE Symposium on Security and Privacy (SP), 926-943, 2018
4792018
Pantheon: the training ground for Internet congestion-control research
FY Yan, J Ma, GD Hill, D Raghavan, RS Wahby, P Levis, K Winstein
2018 USENIX Annual Technical Conference (USENIX ATC 18), 731-743, 2018
3472018
Efficient RAM and control flow in verifiable outsourced computation
RS Wahby, S Setty, M Howald, Z Ren, AJ Blumberg, M Walfish
Cryptology ePrint Archive, 2014
2542014
Salsify:{Low-Latency} network video through tighter integration between a video codec and a transport protocol
S Fouladi, J Emmons, E Orbay, C Wu, RS Wahby, K Winstein
15th USENIX Symposium on Networked Systems Design and Implementation (NSDI …, 2018
2482018
New architectures for radio-frequency DC–DC power conversion
JM Rivas, RS Wahby, JS Shafran, DJ Perreault
IEEE Transactions on Power Electronics 21 (2), 380-393, 2006
2022006
Brakedown: Linear-time and field-agnostic SNARKs for R1CS
A Golovnev, J Lee, S Setty, J Thaler, RS Wahby
Annual International Cryptology Conference, 193-226, 2023
1452023
Unlocking the lookup singularity with lasso
S Setty, J Thaler, R Wahby
Annual International Conference on the Theory and Applications of …, 2024
1272024
Scaling verifiable computation using efficient set accumulators
A Ozdemir, R Wahby, B Whitehat, D Boneh
29th USENIX Security Symposium (USENIX Security 20), 2075-2092, 2020
1212020
Fact: a DSL for timing-sensitive computation
S Cauligi, G Soeller, B Johannesmeyer, F Brown, RS Wahby, J Renner, ...
Proceedings of the 40th ACM SIGPLAN Conference on Programming Language …, 2019
1202019
Full accounting for verifiable outsourcing
RS Wahby, Y Ji, AJ Blumberg, A Shelat, J Thaler, M Walfish, T Wies
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
1152017
Fast and simple constant-time hashing to the BLS12-381 elliptic curve
RS Wahby, D Boneh
Cryptology ePrint Archive, 2019
1002019
Customizable constraint systems for succinct arguments
S Setty, J Thaler, R Wahby
Cryptology ePrint Archive, 2023
832023
Pairing-friendly curves
Y Sakemi, T Kobayashi, T Saito, RS Wahby
IETF Secretariat, 2020
812020
Finding and preventing bugs in javascript bindings
F Brown, S Narayan, RS Wahby, D Engler, R Jhala, D Stefan
2017 IEEE Symposium on Security and Privacy (SP), 559-578, 2017
812017
Verifiable asics
RS Wahby, M Howald, S Garg, A Shelat, M Walfish
2016 IEEE Symposium on Security and Privacy (SP), 759-778, 2016
792016
Brakedown: Linear-time and post-quantum SNARKs for R1CS.
A Golovnev, J Lee, STV Setty, J Thaler, RS Wahby
IACR Cryptol. ePrint Arch. 2021, 1043, 2021
742021
Hashing to elliptic curves
A Faz-Hernández, S Scott, N Sullivan, RS Wahby, CA Wood
Internet Engineering Task Force, Internet-Draft draft-irtf-cfrg-hash-to …, 2021
732021
CirC: Compiler infrastructure for proof systems, software verification, and more
A Ozdemir, F Brown, RS Wahby
2022 IEEE Symposium on Security and Privacy (SP), 2248-2266, 2022
642022
Defending against malicious peripherals with Cinch
S Angel, RS Wahby, M Howald, JB Leners, M Spilo, Z Sun, AJ Blumberg, ...
25th USENIX Security Symposium (USENIX Security 16), 397-414, 2016
572016
The system can't perform the operation now. Try again later.
Articles 1–20