Riad S. Wahby

Orcid: 0000-0002-0224-1989

According to our database1, Riad S. Wahby authored at least 40 papers between 2015 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
Sybil-Resistant Parallel Mixing.
Proc. Priv. Enhancing Technol., 2025

ALPACA: Anonymous Blocklisting with Constant-Sized Updatable Proofs.
Proceedings of the IEEE Symposium on Security and Privacy, 2025

CoBBL: Dynamic Constraint Generation for SNARKs.
Proceedings of the IEEE Symposium on Security and Privacy, 2025

2024
Universal Composability Is Robust Compilation.
ACM Trans. Program. Lang. Syst., December, 2024

Bending microarchitectural weird machines towards practicality.
Proceedings of the 33rd USENIX Security Symposium, 2024

Unlocking the Lookup Singularity with Lasso.
Proceedings of the Advances in Cryptology - EUROCRYPT 2024, 2024

2023
Hashing to Elliptic Curves.
RFC, August, 2023

Specialized Proof of Confidential Knowledge (SPoCK).
IACR Cryptol. ePrint Arch., 2023

NOTRY: deniable messaging with retroactive avowal.
IACR Cryptol. ePrint Arch., 2023

Customizable constraint systems for succinct arguments.
IACR Cryptol. ePrint Arch., 2023

Checking Passwords on Leaky Computers: A Side Channel Analysis of Chrome's Password Leak Detect Protocol.
Proceedings of the 32nd USENIX Security Symposium, 2023

The ghost is the machine: Weird machines in transient execution.
Proceedings of the 2023 IEEE Security and Privacy Workshops (SPW), 2023

Silph: A Framework for Scalable and Accurate Generation of Hybrid MPC Protocols.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

Brakedown: Linear-Time and Field-Agnostic SNARKs for R1CS.
Proceedings of the Advances in Cryptology - CRYPTO 2023, 2023

Riggs: Decentralized Sealed-Bid Auctions.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

Bounded Verification for Finite-Field-Blasting - In a Compiler for Zero Knowledge Proofs.
Proceedings of the Computer Aided Verification - 35th International Conference, 2023

2022
CirC: Compiler infrastructure for proof systems, software verification, and more.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022

2021
Concretely efficient interactive proofs and their applications.
PhD thesis, 2021

Linear-time zero-knowledge SNARKs for R1CS.
IACR Cryptol. ePrint Arch., 2021

Brakedown: Linear-time and post-quantum SNARKs for R1CS.
IACR Cryptol. ePrint Arch., 2021

Compact Certificates of Collective Knowledge.
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021

2020
Unifying Compilers for SNARKs, SMT, and More.
IACR Cryptol. ePrint Arch., 2020

Scaling Verifiable Computation Using Efficient Set Accumulators.
Proceedings of the 29th USENIX Security Symposium, 2020

An Airdrop that Preserves Recipient Privacy.
Proceedings of the Financial Cryptography and Data Security, 2020

2019
Fast and simple constant-time hashing to the BLS12-381 elliptic curve.
IACR Cryptol. ePrint Arch., 2019

Scaling Verifiable Computation Using Efficient Set Accumulators.
IACR Cryptol. ePrint Arch., 2019

Universal Composability is Secure Compilation.
CoRR, 2019

FaCT: a DSL for timing-sensitive computation.
Proceedings of the 40th ACM SIGPLAN Conference on Programming Language Design and Implementation, 2019

2018
Pantheon: the training ground for Internet congestion-control research.
Proceedings of the 2018 USENIX Annual Technical Conference, 2018

Doubly-Efficient zkSNARKs Without Trusted Setup.
Proceedings of the 2018 IEEE Symposium on Security and Privacy, 2018

Salsify: Low-Latency Network Video through Tighter Integration between a Video Codec and a Transport Protocol.
Proceedings of the 15th USENIX Symposium on Networked Systems Design and Implementation, 2018

2017
Finding and Preventing Bugs in JavaScript Bindings.
Proceedings of the 2017 IEEE Symposium on Security and Privacy, 2017

Encoding, Fast and Slow: Low-Latency Video Processing Using Thousands of Tiny Threads.
Proceedings of the 14th USENIX Symposium on Networked Systems Design and Implementation, 2017

Trust but Verify: Auditing the Secure Internet of Things.
Proceedings of the 15th Annual International Conference on Mobile Systems, 2017

Full Accounting for Verifiable Outsourcing.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

2016
Defending against Malicious Peripherals with Cinch.
Proceedings of the 25th USENIX Security Symposium, 2016

Verifiable ASICs.
Proceedings of the IEEE Symposium on Security and Privacy, 2016

Robust, low-cost, auditable random number generation for embedded system security.
Proceedings of the 14th ACM Conference on Embedded Network Sensor Systems, SenSys 2016, 2016

2015
Harmful devices considered harmless.
CoRR, 2015

Efficient RAM and control flow in verifiable outsourced computation.
Proceedings of the 22nd Annual Network and Distributed System Security Symposium, 2015


  Loading...