Suivre
Baiyu Li
Baiyu Li
Google
Adresse e-mail validée de cs.ucsd.edu - Page d'accueil
Titre
Citée par
Citée par
Année
Skypemorph: Protocol obfuscation for tor bridges
H Mohajeri Moghaddam, B Li, M Derakhshani, I Goldberg
Proceedings of the 2012 ACM conference on Computer and communications …, 2012
3162012
On the security of homomorphic encryption on approximate numbers
B Li, D Micciancio
Advances in Cryptology–EUROCRYPT 2021: 40th Annual International Conference …, 2021
2052021
Quotient complexity of ideal languages
J Brzozowski, G Jirásková, B Li
Theoretical Computer Science 470, 36-52, 2013
722013
Semi-parallel logistic regression for GWAS on encrypted data
M Kim, Y Song, B Li, D Micciancio
BMC Medical Genomics 13, 1-13, 2020
702020
Securing approximate homomorphic encryption using differential privacy
B Li, D Micciancio, M Schultz, J Sorrell
Advances in Cryptology–CRYPTO 2022: 42nd Annual International Cryptology …, 2022
602022
Homomorphic encryption for finite automata
N Genise, C Gentry, S Halevi, B Li, D Micciancio
Advances in Cryptology–ASIACRYPT 2019: 25th International Conference on the …, 2019
512019
{ACORN}: Input Validation for Secure Aggregation
J Bell, A Gascón, T Lepoint, B Li, S Meiklejohn, M Raykova, C Yun
32nd USENIX Security Symposium (USENIX Security 23), 4805-4822, 2023
432023
Compactness vs collusion resistance in functional encryption
B Li, D Micciancio
Theory of Cryptography: 14th International Conference, TCC 2016-B, Beijing …, 2016
332016
Syntactic complexity of prefix-, suffix-, bifix-, and factor-free regular languages
J Brzozowski, B Li, Y Ye
Theoretical Computer Science 449, 37-53, 2012
322012
SYNTACTIC COMPLEXITY OF ℛ-AND 𝒥-TRIVIAL REGULAR LANGUAGES
J Brzozowski, B Li
International Journal of Foundations of Computer Science 25 (07), 807-821, 2014
20*2014
Equational security proofs of oblivious transfer protocols
B Li, D Micciancio
Public-Key Cryptography–PKC 2018: 21st IACR International Conference on …, 2018
192018
Syntactic complexities of six classes of star-free languages
J Brzozowski, B Li, D Liu
Otto-von-Guericke-Universit¨ at Magdeburg, 2012
142012
Hintless single-server private information retrieval
B Li, D Micciancio, M Raykova, M Schultz-Wu
Annual International Cryptology Conference, 183-217, 2024
82024
Gadget-based iNTRU lattice trapdoors
N Genise, B Li
Progress in Cryptology–INDOCRYPT 2020: 21st International Conference on …, 2020
82020
Syntactic complexities of some classes of star-free languages
J Brzozowski, B Li
International Workshop on Descriptional Complexity of Formal Systems, 117-129, 2012
82012
Symbolic security of garbled circuits
B Li, D Micciancio
2018 IEEE 31st Computer Security Foundations Symposium (CSF), 147-161, 2018
62018
Syntactic Complexities of Nine Subclasses of Regular Languages
B Li
University of Waterloo, 2012
32012
Willow: Secure Aggregation with One-Shot Clients
J Bell-Clark, A Gascón, B Li, M Raykova, P Schoppmann
Cryptology ePrint Archive, 2024
22024
Computationally Secure Aggregation and Private Information Retrieval in the Shuffle Model
A Gascón, Y Ishai, M Kelkar, B Li, Y Ma, M Raykova
Cryptology ePrint Archive, 2024
22024
On the complexity of the evaluation of transient extensions of boolean functions
J Brzozowski, B Li, Y Ye
International Journal of Foundations of Computer Science 23 (01), 21-35, 2012
22012
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–20