David J. Wu

According to our database1, David J. Wu authored at least 39 papers between 2011 and 2018.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2018
Watermarking PRFs from Lattices: Stronger Security via Extractable PRFs.
IACR Cryptology ePrint Archive, 2018

Multi-Theorem Preprocessing NIZKs from Lattices.
IACR Cryptology ePrint Archive, 2018

Quasi-Optimal SNARGs via Linear Multi-Prover Interactive Proofs.
IACR Cryptology ePrint Archive, 2018

Exploring Crypto Dark Matter: - New Simple PRF Candidates and Their Applications.
Proceedings of the Theory of Cryptography - 16th International Conference, 2018

Function-Hiding Inner Product Encryption Is Practical.
Proceedings of the Security and Cryptography for Networks - 11th International Conference, 2018

Quasi-Optimal SNARGs via Linear Multi-Prover Interactive Proofs.
Proceedings of the Advances in Cryptology - EUROCRYPT 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29, 2018

Multi-Theorem Preprocessing NIZKs from Lattices.
Proceedings of the Advances in Cryptology - CRYPTO 2018, 2018

2017
Access Control Encryption for General Policies from Standard Assumptions.
IACR Cryptology ePrint Archive, 2017

Watermarking Cryptographic Functionalities from Standard Lattice Assumptions.
IACR Cryptology ePrint Archive, 2017

Constrained Keys for Invertible Pseudorandom Functions.
IACR Cryptology ePrint Archive, 2017

Lattice-Based SNARGs and Their Application to More Efficient Obfuscation.
IACR Cryptology ePrint Archive, 2017

Constrained Keys for Invertible Pseudorandom Functions.
Proceedings of the Theory of Cryptography - 15th International Conference, 2017

Constraining Pseudorandom Functions Privately.
Proceedings of the Public-Key Cryptography - PKC 2017, 2017

Quantum Operating Systems.
Proceedings of the 16th Workshop on Hot Topics in Operating Systems, 2017

Lattice-Based SNARGs and Their Application to More Efficient Obfuscation.
Proceedings of the Advances in Cryptology - EUROCRYPT 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30, 2017

Functional Encryption: Deterministic to Randomized Functions from Simple Assumptions.
Proceedings of the Advances in Cryptology - EUROCRYPT 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30, 2017

Watermarking Cryptographic Functionalities from Standard Lattice Assumptions.
Proceedings of the Advances in Cryptology - CRYPTO 2017, 2017

Access Control Encryption for General Policies from Standard Assumptions.
Proceedings of the Advances in Cryptology - ASIACRYPT 2017, 2017

2016
Privately Evaluating Decision Trees and Random Forests.
PoPETs, 2016

Order-Revealing Encryption: New Constructions, Applications, and Lower Bounds.
IACR Cryptology ePrint Archive, 2016

Function-Hiding Inner Product Encryption is Practical.
IACR Cryptology ePrint Archive, 2016

Functional Encryption: Deterministic to Randomized Functions from Simple Assumptions.
IACR Cryptology ePrint Archive, 2016

Privacy-Preserving Shortest Path Computation.
CoRR, 2016

Privacy, Discovery, and Authentication for the Internet of Things.
CoRR, 2016

Privacy-Preserving Shortest Path Computation.
Proceedings of the 23rd Annual Network and Distributed System Security Symposium, 2016

Practical Order-Revealing Encryption with Limited Leakage.
Proceedings of the Fast Software Encryption - 23rd International Conference, 2016

Privacy, Discovery, and Authentication for the Internet of Things.
Proceedings of the Computer Security - ESORICS 2016, 2016

Order-Revealing Encryption: New Constructions, Applications, and Lower Bounds.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

2015
Designing a Winning Arimaa Program.
ICGA Journal, 2015

Privately Evaluating Decision Trees and Random Forests.
IACR Cryptology ePrint Archive, 2015

Practical Order-Revealing Encryption with Limited Leakage.
IACR Cryptology ePrint Archive, 2015

Constraining Pseudorandom Functions Privately.
IACR Cryptology ePrint Archive, 2015

Fully Homomorphic Encryption: Cryptography's holy grail.
ACM Crossroads, 2015

2014
Immunizing Multilinear Maps Against Zeroizing Attacks.
IACR Cryptology ePrint Archive, 2014

2013
Private Database Queries Using Somewhat Homomorphic Encryption.
IACR Cryptology ePrint Archive, 2013

Deep learning with COTS HPC systems.
Proceedings of the 30th International Conference on Machine Learning, 2013

Private Database Queries Using Somewhat Homomorphic Encryption.
Proceedings of the Applied Cryptography and Network Security, 2013

2012
End-to-end text recognition with convolutional neural networks.
Proceedings of the 21st International Conference on Pattern Recognition, 2012

2011
Text Detection and Character Recognition in Scene Images with Unsupervised Feature Learning.
Proceedings of the 2011 International Conference on Document Analysis and Recognition, 2011


  Loading...