Xiao Wang
Xiao Wang
Verified email at cs.northwestern.edu - Homepage
Title
Cited by
Cited by
Year
ObliVM: A Programming Framework for Secure Computation
C Liu, XS Wang, K Nayak, Y Huang, E Shi
IEEE S & P, 2015
3132015
Circuit ORAM: On Tightness of the Goldreich-Ostrovsky Lower Bound
XS Wang, THH Chan, E Shi
ACM SIGSAC Conference on Computer and Communications Security, 2015
2392015
Oblivious Data Structures
XS Wang, K Nayak, C Liu, THH Chan, E Shi, E Stefanov, Y Huang
ACM SIGSAC Conference on Computer and Communications Security, 215-226, 2014
1782014
SCORAM: oblivious RAM for secure computation
XS Wang, Y Huang, THH Chan, A Shelat, E Shi
ACM SIGSAC Conference on Computer and Communications Security, 191-202, 2014
1662014
GraphSC: Parallel Secure Computation Made Easy
K Nayak, XS Wang, S Ioannidis, U Weinsberg, N Taft, E Shi
IEEE S & P, 2015
1302015
Global-Scale Secure Multiparty Computation
X Wang, S Ranellucci, J Katz
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communicationsá…, 2017
1272017
Authenticated garbling and efficient maliciously secure two-party computation
X Wang, S Ranellucci, J Katz
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communicationsá…, 2017
1222017
Efficient Genome-Wide, Privacy-Preserving Similar Patient Query based on Private Edit Distance
XS Wang, Y Huang, Y Zhao, H Tang, X Wang, D Bu
ACM SIGSAC Conference on Computer and Communications Security, 2015
1082015
Improved Non-Interactive Zero Knowledge with Applications to Post-Quantum Signatures
J Katz, V Kolesnikov, X Wang
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communicationsá…, 2018
1012018
EMP-toolkit: Efficient MultiParty computation toolkit
X Wang, AJ Malozemoff, J Katz
https://github.com/emp-toolkit, 2016
1012016
Revisiting Square-Root ORAM: Efficient Random Access in Multi-Party Computation
S Zahur, X Wang, M Raykova, A Gascˇn, J Doerner, D Evans, J Katz
Security and Privacy (SP), 2016 IEEE Symposium on, 218-234, 2016
95*2016
Faster Secure Two-Party Computation in the Single-Execution Setting
X Wang, AJ Malozemoff, J Katz
Advances in Cryptology -- EUROCRYPT 2017, 2017
54*2017
Optimizing authenticated garbling for faster secure two-party computation
J Katz, S Ranellucci, M Rosulek, X Wang
Annual International Cryptology Conference, 365-391, 2018
282018
Secure Computation of MIPS Machine Code
X Wang, SD Gordon, A McIntosh, J Katz
European Symposium on Research in Computer Security, 2016
272016
Wolverine: fast, scalable, and communication-efficient zero-knowledge proofs for boolean and arithmetic circuits
C Weng, K Yang, J Katz, X Wang
2021 IEEE Symposium on Security and Privacy (SP), 1074-1091, 2021
242021
Simple and efficient two-server ORAM
SD Gordon, J Katz, X Wang
International Conference on the Theory and Application of Cryptology andá…, 2018
21*2018
Secure Computation with Low Communication from Cross-checking
SD Gordon, S Ranellucci, X Wang
Advances in Cryptology–ASIACRYPT, 2018
192018
Ferret: Fast extension for correlated OT with small communication
K Yang, C Weng, X Lan, J Zhang, X Wang
Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communicationsá…, 2020
182020
Efficient and secure multiparty computation from fixed-key block ciphers
C Guo, J Katz, X Wang, Y Yu
2020 IEEE Symposium on Security and Privacy (SP), 825-841, 2020
182020
Covert security with public verifiability: Faster, leaner, and simpler
C Hong, J Katz, V Kolesnikov, W Lu, X Wang
Annual International Conference on the Theory and Applications ofá…, 2019
182019
The system can't perform the operation now. Try again later.
Articles 1–20