Ling Ren

If you made any changes in Pure these will be visible here soon.
Filter
Conference contribution

Search results

  • 2020

    Sync HotStuff: Simple and practical synchronous state machine replication

    Abraham, I., Malkhi, D., Nayak, K., Ren, L. & Yin, M., May 2020, Proceedings - 2020 IEEE Symposium on Security and Privacy, SP 2020. Institute of Electrical and Electronics Engineers Inc., p. 106-118 13 p. 9152792. (Proceedings - IEEE Symposium on Security and Privacy; vol. 2020-May).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 2019

    Breaking the Oblivious-RAM Bandwidth Wall

    Omar, H., Haider, S. K., Ren, L., Dijk, M. V. & Khan, O., Jan 16 2019, Proceedings - 2018 IEEE 36th International Conference on Computer Design, ICCD 2018. Institute of Electrical and Electronics Engineers Inc., p. 115-122 8 p. 8615676. (Proceedings - 2018 IEEE 36th International Conference on Computer Design, ICCD 2018).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Communication complexity of byzantine agreement, revisited

    Abraham, I., Chan, T. H. H., Dolev, D., Nayak, K., Pass, R., Ren, L. & Shi, E., Jul 16 2019, PODC 2019 - Proceedings of the 2019 ACM Symposium on Principles of Distributed Computing. Association for Computing Machinery, p. 317-326 10 p. (Proceedings of the Annual ACM Symposium on Principles of Distributed Computing).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Flexible Byzantine fault tolerance

    Malkhi, D., Nayak, K. & Ren, L., Nov 6 2019, CCS 2019 - Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 1041-1053 13 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
  • Locality-preserving oblivious RAM

    Asharov, G., Hubert Chan, T. H., Nayak, K., Pass, R., Ren, L. & Shi, E., Jan 1 2019, Advances in Cryptology – EUROCRYPT 2019 - 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. Ishai, Y. & Rijmen, V. (eds.). Springer-Verlag, p. 214-243 30 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11477 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Onion ring oram: Efficient constant bandwidth oblivious RAM from (leveled) TFHE

    Chen, H., Chillotti, I. & Ren, L., Nov 6 2019, CCS 2019 - Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 345-360 16 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
  • Synchronous Byzantine Agreement with Expected O(1) Rounds, Expected $$O(n^2)$$ Communication, and Optimal Resilience

    Abraham, I., Devadas, S., Dolev, D., Nayak, K. & Ren, L., 2019, Financial Cryptography and Data Security - 23rd International Conference, FC 2019, Revised Selected Papers. Goldberg, I. & Moore, T. (eds.). Springer, p. 320-334 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11598 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 2018

    Bandwidth-hard functions: Reductions and lower bounds

    Blocki, J., Ren, L. & Zhou, S., Oct 15 2018, CCS 2018 - Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 1820-1836 17 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Solida: A blockchain protocol based on reconfigurable Byzantine consensus

    Abraham, I., Malkhi, D., Nayak, K., Ren, L. & Spiegelman, A., Mar 1 2018, 21st International Conference on Principles of Distributed Systems, OPODIS 2017. Aspnes, J., Leitao, J., Bessani, A. & Felber, P. (eds.). Schloss Dagstuhl- Leibniz-Zentrum fur Informatik GmbH, Dagstuhl Publishing, 25. (Leibniz International Proceedings in Informatics, LIPIcs; vol. 95).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 2017

    A note on the security of equihash

    Alcock, L. & Ren, L., Nov 3 2017, CCSW 2017 - Proceedings of the 2017 Cloud Computing Security Workshop, co-located with CCS 2017. Association for Computing Machinery, Inc, p. 51-55 5 p. (CCSW 2017 - Proceedings of the 2017 Cloud Computing Security Workshop, co-located with CCS 2017).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Asymptotically tight bounds for composing ORAM with PIR

    Abraham, I., Fletcher, C. W., Nayak, K., Pinkas, B. & Ren, L., Jan 1 2017, Public-Key Cryptography – PKC 2017 - 20th IACR International Conference on Practice and Theory in Public-Key Cryptography, Proceedings. Fehr, S. (ed.). Springer-Verlag Berlin Heidelberg, p. 91-120 30 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10174 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Bandwidth Hard Functions for ASIC Resistance

    Ren, L. & Devadas, S., Jan 1 2017, Theory of Cryptography - 15th International Conference, TCC 2017, Proceedings. Kalai, Y. & Reyzin, L. (eds.). Springer-Verlag, p. 466-492 27 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10677 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Brief announcement: Practical synchronous byzantine consensus

    Abraham, I., Devadas, S., Nayak, K. & Ren, L., Oct 1 2017, 31st International Symposium on Distributed Computing, DISC 2017. Richa, A. W. (ed.). Schloss Dagstuhl- Leibniz-Zentrum fur Informatik GmbH, Dagstuhl Publishing, (Leibniz International Proceedings in Informatics, LIPIcs; vol. 91).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • On iterative collision search for LPN and subset sum

    Devadas, S., Ren, L. & Xiao, H., Jan 1 2017, Theory of Cryptography - 15th International Conference, TCC 2017, Proceedings. Kalai, Y. & Reyzin, L. (eds.). Springer-Verlag, p. 729-746 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10678 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 2016

    Onion ORAM: A constant bandwidth blowup oblivious RAM

    Devadas, S., van Dijk, M., Fletcher, C. W., Ren, L., Shi, E. & Wichs, D., Jan 1 2016, Theory of Cryptography - 3th International Conference, TCC 2016-A, Proceedings. Malkin, T. & Kushilevitz, E. (eds.). Springer-Verlag Berlin Heidelberg, p. 145-174 30 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9563).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Proof of space from stacked expanders

    Ren, L. & Devadas, S., 2016, Theory of Cryptography - 14th International Conference, TCC 2016-B, Proceedings. Smith, A. & Hirt, M. (eds.). Springer-Verlag Berlin Heidelberg, p. 262-285 24 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9985 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 2015

    A low-latency, low-area hardware oblivious RAM controller

    Fletcher, C. W., Ren, L., Kwon, A., Van Dijk, M., Stefanov, E., Serpanos, D. & Devadas, S., Jul 15 2015, Proceedings - 2015 IEEE 23rd Annual International Symposium on Field-Programmable Custom Computing Machines, FCCM 2015. Institute of Electrical and Electronics Engineers Inc., p. 215-222 8 p. 7160074. (Proceedings - 2015 IEEE 23rd Annual International Symposium on Field-Programmable Custom Computing Machines, FCCM 2015).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Constants count: Practical improvements to oblivious RAM

    Ren, L., Fletcher, C., Kwon, A., Stefanov, E., Shi, E., Van Dijk, M. & Devadas, S., Jan 1 2015, Proceedings of the 24th USENIX Security Symposium. USENIX Association, p. 415-430 16 p. (Proceedings of the 24th USENIX Security Symposium).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Freecursive ORAM: [Nearly] free recursion and integrity verification for position-based oblivious RAM

    Fletcher, C. W., Ren, L., Kwon, A., Van Dijk, M. & Devadas, S., Mar 14 2015, ASPLOS 2015 - 20th International Conference on Architectural Support for Programming Languages and Operating Systems. Association for Computing Machinery, p. 103-116 14 p. (International Conference on Architectural Support for Programming Languages and Operating Systems - ASPLOS; vol. 2015-January).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • PrORAM: Dynamic prefetcher for oblivious RAM

    Yu, X., Haider, S. K., Ren, L., Fletcher, C., Kwon, A., Van Dijk, M. & Devadas, S., Jun 13 2015, ISCA 2015 - 42nd Annual International Symposium on Computer Architecture, Conference Proceedings. Institute of Electrical and Electronics Engineers Inc., p. 616-628 13 p. (Proceedings - International Symposium on Computer Architecture; vol. 13-17-June-2015).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 2014

    Suppressing the Oblivious RAM timing channel while making information leakage and program efficiency trade-offs

    Fletchery, C. W., Ren, L., Yu, X., Van Dijk, M., Khan, O. & Devadas, S., Jan 1 2014, 20th IEEE International Symposium on High Performance Computer Architecture, HPCA 2014. IEEE Computer Society, p. 213-224 12 p. 6835932. (Proceedings - International Symposium on High-Performance Computer Architecture).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 2013

    Design space exploration and optimization of path oblivious RAM in secure processors

    Ren, L., Yu, X., Fletcher, C. W., Van Dijk, M. & Devadas, S., Aug 12 2013, ISCA 2013 - 40th Annual International Symposium on Computer Architecture, Conference Proceedings. p. 571-582 12 p. (Proceedings - International Symposium on Computer Architecture).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Generalized external interaction with tamper-resistant hardware with bounded information leakage

    Yu, X., Fletcher, C. W., Ren, L., Van Dijk, M. & Devadas, S., Dec 9 2013, CCSW 2013 - Proceedings of the 2013 ACM Cloud Computing Security Workshop, Co-located with CCS 2013. p. 23-33 11 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Integrity verification for path Oblivious-RAM

    Ren, L., Fletcher, C. W., Yu, X., Van Dijk, M. & Devadas, S., Jan 1 2013, 2013 IEEE High Performance Extreme Computing Conference, HPEC 2013. IEEE Computer Society, 6670339. (2013 IEEE High Performance Extreme Computing Conference, HPEC 2013).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Path ORAM: An extremely simple oblivious RAM protocol

    Stefanov, E., Van Dijk, M., Shi, E., Fletcher, C., Ren, L., Yu, X. & Devadas, S., Dec 9 2013, CCS 2013 - Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security. p. 299-310 12 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 2012

    Probabilistic brain fiber tractography on GPUs

    Xu, M., Zhang, X., Wang, Y., Ren, L., Wen, Z., Xu, Y., Gong, G., Xu, N. & Yang, H., Oct 18 2012, Proceedings of the 2012 IEEE 26th International Parallel and Distributed Processing Symposium Workshops, IPDPSW 2012. p. 742-751 10 p. 6270714. (Proceedings of the 2012 IEEE 26th International Parallel and Distributed Processing Symposium Workshops, IPDPSW 2012).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Sparse LU factorization for parallel circuit simulation on GPU

    Ren, L., Chen, X., Wang, Y., Zhang, C. & Yang, H., Jul 11 2012, Proceedings of the 49th Annual Design Automation Conference, DAC '12. p. 1125-1130 6 p. (Proceedings - Design Automation Conference).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 2011

    A heterogeneous accelerator platform for multi-subject voxel-based brain network analysis

    Wang, Y., Xu, M., Ren, L., Zhang, X., Wu, D., He, Y., Xu, N. & Yang, H., Dec 1 2011, 2011 IEEE/ACM International Conference on Computer-Aided Design, ICCAD 2011. p. 339-344 6 p. 6105352. (IEEE/ACM International Conference on Computer-Aided Design, Digest of Technical Papers, ICCAD).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution