Path ORAM: an extremely simple oblivious RAM protocol E Stefanov, M Dijk, E Shi, THH Chan, C Fletcher, L Ren, X Yu, S Devadas Journal of the ACM (JACM) 65 (4), 1-26, 2018 | 1282 | 2018 |
Multi-dimensional range query over encrypted data E Shi, J Bethencourt, THH Chan, D Song, A Perrig 2007 IEEE Symposium on Security and Privacy (SP'07), 350-364, 2007 | 753 | 2007 |
Private and continual release of statistics THH Chan, E Shi, D Song ACM Transactions on Information and System Security (TISSEC) 14 (3), 1-24, 2011 | 627 | 2011 |
Oblivious RAM with O((logN)3) Worst-Case Cost E Shi, THH Chan, E Stefanov, M Li Advances in Cryptology–ASIACRYPT 2011: 17th International Conference on the …, 2011 | 560 | 2011 |
Circuit oram: On tightness of the goldreich-ostrovsky lower bound X Wang, H Chan, E Shi Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015 | 361 | 2015 |
Oblivious data structures XS Wang, K Nayak, C Liu, THH Chan, E Shi, E Stefanov, Y Huang Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014 | 276 | 2014 |
Privacy-preserving stream aggregation with fault tolerance THH Chan, E Shi, D Song Financial Cryptography and Data Security: 16th International Conference, FC …, 2012 | 269 | 2012 |
SCORAM: oblivious RAM for secure computation XS Wang, Y Huang, THH Chan, A Shelat, E Shi Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014 | 203 | 2014 |
On hierarchical routing in doubling metrics THH Chan, A Gupta, BM Maggs, S Zhou ACM Transactions on Algorithms (TALG) 12 (4), 1-22, 2016 | 167 | 2016 |
How to vote privately using bitcoin Z Zhao, THH Chan Information and Communications Security: 17th International Conference …, 2016 | 159 | 2016 |
Communication complexity of byzantine agreement, revisited I Abraham, THH Chan, D Dolev, K Nayak, R Pass, L Ren, E Shi Proceedings of the 2019 ACM Symposium on Principles of Distributed Computing …, 2019 | 147 | 2019 |
Differentially private continual monitoring of heavy hitters from distributed streams THH Chan, M Li, E Shi, W Xu Privacy Enhancing Technologies: 12th International Symposium, PETS 2012 …, 2012 | 142 | 2012 |
Optimal lower bound for differentially private multi-party aggregation THH Chan, E Shi, D Song European Symposium on Algorithms, 277-288, 2012 | 131 | 2012 |
A random-surfer web-graph model A Blum, THH Chan, MR Rwebangira 2006 Proceedings of the Third Workshop on Analytic Algorithmics and …, 2006 | 100 | 2006 |
Spectral properties of hypergraph laplacian and approximation algorithms THH Chan, A Louis, ZG Tang, C Zhang Journal of the ACM (JACM) 65 (3), 1-48, 2018 | 99 | 2018 |
Finding subgraphs with maximum total density and limited overlap OD Balalau, F Bonchi, THH Chan, F Gullo, M Sozio Proceedings of the Eighth ACM International Conference on Web Search and …, 2015 | 98 | 2015 |
Privacy-preserving aggregation of Time-series data R Shi, R Chow, THH Chan US Patent 8,555,400, 2013 | 94 | 2013 |
Pala: A simple partially synchronous blockchain THH Chan, R Pass, E Shi Cryptology ePrint Archive, 2018 | 84 | 2018 |
Large scale density-friendly graph decomposition via convex programming M Danisch, THH Chan, M Sozio Proceedings of the 26th International Conference on World Wide Web, 233-242, 2017 | 81 | 2017 |
CC: A Framework for Building Composable Zero-Knowledge Proofs A Kosba, Z Zhao, A Miller, Y Qian, H Chan, C Papamanthou, R Pass, ... Cryptology ePrint Archive, 2015 | 81 | 2015 |