Ruiyu Zhu

Orcid: 0000-0003-3179-4563

According to our database1, Ruiyu Zhu authored at least 15 papers between 2015 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Efficient Actively Secure DPF and RAM-based 2PC with One-Bit Leakage.
IACR Cryptol. ePrint Arch., 2024

2022
Efficient and Precise Secure Generalized Edit Distance and Beyond.
IEEE Trans. Dependable Secur. Comput., 2022

PAPAYA: Practical, Private, and Scalable Federated Learning.
Proceedings of Machine Learning and Systems 2022, 2022

2021
Hash-Enabled Garbling and the Insecurity of Free-Hashing Garbled Circuits.
Proceedings of the ASIA CCS '21: ACM Asia Conference on Computer and Communications Security, 2021

2020
Practical MPC+FHE with Applications in Secure Multi-PartyNeural Network Evaluation.
IACR Cryptol. ePrint Arch., 2020

Secure multiparty computations in floating-point arithmetic.
CoRR, 2020

2019
Efficient Publicly Verifiable 2PC over a Blockchain with Applications to Financially-Secure Computations.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

2018
NANOPI: Extreme-Scale Actively-Secure Multi-Party Computation.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

2017
Efficient Privacy-Preserving Edit Distance and Beyond.
IACR Cryptol. ePrint Arch., 2017

Faster LEGO-based Secure Computation without Homomorphic Commitments.
IACR Cryptol. ePrint Arch., 2017

Cost-Aware Cut-and-Choose Games with Applications in Cryptography and Prefix-Free Codes.
IACR Cryptol. ePrint Arch., 2017

Pool: Scalable On-Demand Secure Computation Service Against Malicious Adversaries.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

JIMU: Faster LEGO-Based Secure Computation Using Additive Homomorphic Hashes.
Proceedings of the Advances in Cryptology - ASIACRYPT 2017, 2017

2016
The Cut-and-Choose Game and Its Application to Cryptographic Protocols.
Proceedings of the 25th USENIX Security Symposium, 2016

2015
Revisiting LEGOs: Optimizations, Analysis, and their Limit.
IACR Cryptol. ePrint Arch., 2015


  Loading...