Path oram: An extremely simple oblivious ram protocol E Stefanov, M Van Dijk, E Shi, C Fletcher, L Ren, X Yu, S Devadas Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013 | 1207* | 2013 |
Constants Count: Practical Improvements to Oblivious RAM L Ren, CW Fletcher, A Kwon, E Stefanov, E Shi, M van Dijk, S Devadas 24th USENIX Security Symposium (USENIX Security 2015), 2015 | 284* | 2015 |
Synchronous byzantine agreement with expected O(1) rounds, expected O(n2) communication, and optimal resilience I Abraham, S Devadas, D Dolev, K Nayak, L Ren Financial Cryptography and Data Security (FC), 2019 | 245* | 2019 |
Onion ORAM: a constant bandwidth blowup oblivious RAM S Devadas, M van Dijk, CW Fletcher, L Ren, E Shi, D Wichs Theory of Cryptography Conference, 145-174, 2016 | 210 | 2016 |
Sync hotstuff: Simple and practical synchronous state machine replication I Abraham, D Malkhi, K Nayak, L Ren, M Yin 2020 IEEE Symposium on Security and Privacy (SP), 106-118, 2020 | 203 | 2020 |
Solida: A blockchain protocol based on reconfigurable byzantine consensus I Abraham, D Malkhi, K Nayak, L Ren, A Spiegelman arXiv preprint arXiv:1612.02916, 2016 | 176 | 2016 |
Design space exploration and optimization of path oblivious ram in secure processors L Ren, X Yu, CW Fletcher, M Van Dijk, S Devadas Proceedings of the 40th Annual International Symposium on Computer …, 2013 | 171 | 2013 |
Freecursive oram: [nearly] free recursion and integrity verification for position-based oblivious ram CW Fletcher, L Ren, A Kwon, M van Dijk, S Devadas Proceedings of the Twentieth International Conference on Architectural …, 2015 | 139* | 2015 |
Communication complexity of byzantine agreement, revisited I Abraham, TH Chan, D Dolev, K Nayak, R Pass, L Ren, E Shi Proceedings of the 2019 ACM Symposium on Principles of Distributed Computing …, 2019 | 131 | 2019 |
Trapdoor Computational Fuzzy Extractors and Stateless Cryptographically-Secure Physical Unclonable Functions C Herder, L Ren, M van Dijk, MDM Yu, S Devadas | 123 | 2015 |
Suppressing the oblivious ram timing channel while making information leakage and program efficiency trade-offs CW Fletchery, L Ren, X Yu, M Van Dijk, O Khan, S Devadas 2014 IEEE 20th International Symposium on High Performance Computer …, 2014 | 122 | 2014 |
Solidus: An incentive-compatible cryptocurrency based on permissionless byzantine consensus I Abraham, D Malkhi, K Nayak, L Ren, A Spiegelman CoRR, abs/1612.02916, 2016 | 120 | 2016 |
Flexible byzantine fault tolerance D Malkhi, K Nayak, L Ren Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019 | 116 | 2019 |
Analysis of Nakamoto Consensus L Ren Cryptology ePrint Archive, Report 2019/943.(2019). https://eprint. iacr. org …, 2019 | 98 | 2019 |
Good-case latency of byzantine broadcast: A complete categorization I Abraham, K Nayak, L Ren, Z Xiang Proceedings of the 2021 ACM Symposium on Principles of Distributed Computing …, 2021 | 94* | 2021 |
Improved Extension Protocols for Byzantine Broadcast and Agreement K Nayak, L Ren, E Shi, NH Vaidya, Z Xiang arXiv preprint arXiv:2002.11321, 2020 | 89 | 2020 |
GPU-accelerated sparse LU factorization for circuit simulation with performance modeling X Chen, L Ren, Y Wang, H Yang IEEE Transactions on Parallel and Distributed Systems 26 (3), 786-795, 2014 | 89 | 2014 |
A low-latency, low-area hardware oblivious ram controller CW Fletcher, L Ren, A Kwon, M Van Dijk, E Stefanov, D Serpanos, ... Field-Programmable Custom Computing Machines (FCCM), 2015 IEEE 23rd Annual …, 2015 | 87* | 2015 |
Practical asynchronous distributed key generation S Das, T Yurek, Z Xiang, A Miller, L Kokoris-Kogias, L Ren 2022 IEEE Symposium on Security and Privacy (SP), 2518-2534, 2022 | 84 | 2022 |
Asynchronous data dissemination and its applications S Das, Z Xiang, L Ren Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications …, 2021 | 81 | 2021 |