Ruiyu Zhu

Orcid: 0000-0003-3179-4563

According to our database1, Ruiyu Zhu authored at least 16 papers between 2015 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Efficient Actively Secure DPF and RAM-based 2PC with One-Bit Leakage.
IACR Cryptol. ePrint Arch., 2024

Scalable Private Search with Wally.
CoRR, 2024

2022
Efficient and Precise Secure Generalized Edit Distance and Beyond.
IEEE Trans. Dependable Secur. Comput., 2022

PAPAYA: Practical, Private, and Scalable Federated Learning.
Proceedings of the Fifth Conference on Machine Learning and Systems, 2022

2021
Hash-Enabled Garbling and the Insecurity of Free-Hashing Garbled Circuits.
Proceedings of the ASIA CCS '21: ACM Asia Conference on Computer and Communications Security, 2021

2020
Practical MPC+FHE with Applications in Secure Multi-PartyNeural Network Evaluation.
IACR Cryptol. ePrint Arch., 2020

Secure multiparty computations in floating-point arithmetic.
CoRR, 2020

2019
Efficient Publicly Verifiable 2PC over a Blockchain with Applications to Financially-Secure Computations.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

2018
NANOPI: Extreme-Scale Actively-Secure Multi-Party Computation.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

2017
Efficient Privacy-Preserving Edit Distance and Beyond.
IACR Cryptol. ePrint Arch., 2017

Faster LEGO-based Secure Computation without Homomorphic Commitments.
IACR Cryptol. ePrint Arch., 2017

Cost-Aware Cut-and-Choose Games with Applications in Cryptography and Prefix-Free Codes.
IACR Cryptol. ePrint Arch., 2017

Pool: Scalable On-Demand Secure Computation Service Against Malicious Adversaries.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

JIMU: Faster LEGO-Based Secure Computation Using Additive Homomorphic Hashes.
Proceedings of the Advances in Cryptology - ASIACRYPT 2017, 2017

2016
The Cut-and-Choose Game and Its Application to Cryptographic Protocols.
Proceedings of the 25th USENIX Security Symposium, 2016

2015
Revisiting LEGOs: Optimizations, Analysis, and their Limit.
IACR Cryptol. ePrint Arch., 2015


  Loading...