Ni Trieu

Orcid: 0000-0001-6013-9512

According to our database1, Ni Trieu authored at least 44 papers between 2016 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
HADES: Range-Filtered Private Aggregation on Public Data.
Proc. VLDB Endow., March, 2025

Delay-Aware Robust Edge Network Hardening Under Decision-Dependent Uncertainty.
IEEE Trans. Netw. Sci. Eng., 2025

SecureED: Secure Multiparty Edit Distance for Genomic Sequences.
Proc. Priv. Enhancing Technol., 2025

Achieving Data Reconstruction Hardness and Efficient Computation in Multiparty Minimax Training.
IACR Cryptol. ePrint Arch., 2025

SecurED: Secure Multiparty Edit Distance for Genomic Sequences.
IACR Cryptol. ePrint Arch., 2025

Threshold FHE with Efficient Asynchronous Decryption.
IACR Cryptol. ePrint Arch., 2025

Shared OT and Its Applications.
IACR Commun. Cryptol., 2025

Mario: Multi-round Multiple-Aggregator Secure Aggregation with Robustness against Malicious Actors.
Proceedings of the 10th IEEE European Symposium on Security and Privacy, 2025

Distance-Aware OT with Application to Fuzzy PSI.
Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security, 2025

PULSE: Parallel Private Set Union for Large-Scale Entities.
Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security, 2025

2024
Batched Distributed Point Function from Sparse LPN and Homomorphic Secret Sharing.
IACR Cryptol. ePrint Arch., 2024

Shared OT and Its Applications to Unconditional Secure Integer Equality, Comparison and Bit-Decomposition.
IACR Cryptol. ePrint Arch., 2024

Optimal Workload Allocation for Distributed Edge Clouds with Renewable Energy and Battery Storage.
Proceedings of the International Conference on Computing, Networking and Communications, 2024

AITIA: Efficient Secure Computation of Bivariate Causal Discovery.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024

2023
A Fairness-Aware Attacker-Defender Model for Optimal Edge Network Operation and Protection.
IEEE Netw. Lett., 2023

Delegated Private Matching for Compute.
IACR Cryptol. ePrint Arch., 2023

Toward A Practical Multi-party Private Set Union.
IACR Cryptol. ePrint Arch., 2023

Quantum-based Distributed Algorithms for Edge Node Placement and Workload Allocation.
CoRR, 2023

Street Rep: A Privacy-Preserving Reputation Aggregation System.
Proceedings of the Security and Privacy in Communication Networks, 2023

Fast ORAM with Server-Aided Preprocessing and Pragmatic Privacy-Efficiency Trade-Off.
Proceedings of the Cyber Security, Cryptology, and Machine Learning, 2023

Privacy-Preserving Digital Vaccine Passport.
Proceedings of the Cryptology and Network Security - 22nd International Conference, 2023

2022
Two-Stage Robust Edge Service Placement and Sizing Under Demand Uncertainty.
IEEE Internet Things J., 2022

COVID-19 and cybersecurity.
IET Inf. Secur., 2022

Secure contact tracing platform from simplest private set intersection cardinality.
IET Inf. Secur., 2022

Multiparty Private Set Intersection Cardinality and Its Applications.
IACR Cryptol. ePrint Arch., 2022

MPCCache: Privacy-Preserving Multi-Party Cooperative Cache Sharing at the Edge.
Proceedings of the Financial Cryptography and Data Security, 2022

2021
Oblivious Key-Value Stores and Amplification for Private Set Intersection.
Proceedings of the Advances in Cryptology - CRYPTO 2021, 2021

Compact and Malicious Private Set Intersection for Small Sets.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

Simple, Fast Malicious Multiparty Private Set Intersection.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

Private Join and Compute from PIR with Default.
Proceedings of the Advances in Cryptology - ASIACRYPT 2021, 2021

2020
Epione: Lightweight Contact Tracing with Strong Privacy.
IEEE Data Eng. Bull., 2020

BeeTrace: A Unified Platform for Secure Contact Tracing that Breaks Data Silos.
IEEE Data Eng. Bull., 2020

PSI from PaXoS: Fast, Malicious Private Set Intersection.
Proceedings of the Advances in Cryptology - EUROCRYPT 2020, 2020

Catalic: Delegated PSI Cardinality with Applications to Contact Tracing.
Proceedings of the Advances in Cryptology - ASIACRYPT 2020, 2020

2019
Practical Privacy-Preserving K-means Clustering.
IACR Cryptol. ePrint Arch., 2019

Attacks only Get Better: How to Break FF3 on Large Domains.
Proceedings of the Advances in Cryptology - EUROCRYPT 2019, 2019

SpOT-Light: Lightweight Private Set Intersection from Sparse OT Extension.
Proceedings of the Advances in Cryptology - CRYPTO 2019, 2019

Scalable Private Set Union from Symmetric-Key Techniques.
Proceedings of the Advances in Cryptology - ASIACRYPT 2019, 2019

2018
PIR-PSI: Scaling Private Contact Discovery.
IACR Cryptol. ePrint Arch., 2018

SWiM: Secure Wildcard Pattern Matching from OT Extension.
Proceedings of the Financial Cryptography and Data Security, 2018

The Curse of Small Domains: New Attacks on Format-Preserving Encryption.
Proceedings of the Advances in Cryptology - CRYPTO 2018, 2018

2017
DUPLO: Unifying Cut-and-Choose for Garbled Circuits.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

Practical Multi-party Private Set Intersection from Symmetric-Key Techniques.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

2016
Efficient Batched Oblivious PRF with Applications to Private Set Intersection.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016


  Loading...