Riad S. Wahby
Riad S. Wahby
Bestätigte E-Mail-Adresse bei cs.stanford.edu - Startseite
Zitiert von
Zitiert von
New architectures for radio-frequency DC–DC power conversion
JM Rivas, RS Wahby, JS Shafran, DJ Perreault
IEEE Transactions on Power Electronics 21 (2), 380-393, 2006
Encoding, fast and slow: Low-latency video processing using thousands of tiny threads
S Fouladi, RS Wahby, B Shacklett, KV Balasubramaniam, W Zeng, ...
14th {USENIX} Symposium on Networked Systems Design and Implementation …, 2017
Efficient RAM and control flow in verifiable outsourced computation.
RS Wahby, STV Setty, Z Ren, AJ Blumberg, M Walfish
NDSS, 2015
Doubly-efficient zkSNARKs without trusted setup
RS Wahby, I Tzialla, A Shelat, J Thaler, M Walfish
2018 IEEE Symposium on Security and Privacy (SP), 926-943, 2018
Pantheon: the training ground for Internet congestion-control research
FY Yan, J Ma, GD Hill, D Raghavan, RS Wahby, P Levis, K Winstein
2018 {USENIX} Annual Technical Conference ({USENIX}{ATC} 18), 731-743, 2018
Full accounting for verifiable outsourcing
RS Wahby, Y Ji, AJ Blumberg, A Shelat, J Thaler, M Walfish, T Wies
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
Verifiable asics
RS Wahby, M Howald, S Garg, A Shelat, M Walfish
2016 IEEE Symposium on Security and Privacy (SP), 759-778, 2016
Salsify: Low-latency network video through tighter integration between a video codec and a transport protocol
S Fouladi, J Emmons, E Orbay, C Wu, RS Wahby, K Winstein
15th {USENIX} Symposium on Networked Systems Design and Implementation …, 2018
Defending against malicious peripherals with Cinch
S Angel, RS Wahby, M Howald, JB Leners, M Spilo, Z Sun, AJ Blumberg, ...
25th {USENIX} Security Symposium ({USENIX} Security 16), 397-414, 2016
Trust but verify: Auditing the secure Internet of things
J Wilson, RS Wahby, H Corrigan-Gibbs, D Boneh, P Levis, K Winstein
Proceedings of the 15th Annual International Conference on Mobile Systems …, 2017
Method and apparatus for switched-mode power conversion at radio frequencies
D Perreault, J Rivas, R Wahby, J Shafran
US Patent App. 11/109,498, 2005
Finding and preventing bugs in javascript bindings
F Brown, S Narayan, RS Wahby, D Engler, R Jhala, D Stefan
2017 IEEE Symposium on Security and Privacy (SP), 559-578, 2017
FaCT: a DSL for timing-sensitive computation
S Cauligi, G Soeller, B Johannesmeyer, F Brown, RS Wahby, J Renner, ...
Proceedings of the 40th ACM SIGPLAN Conference on Programming Language …, 2019
abhi shelat, Justin Thaler, and Michael Walfish. Doubly-efficient zksnarks without trusted setup
RS Wahby, I Tzialla
2018 IEEE Symposium on Security and Privacy, 926-943, 2018
Fast and simple constant-time hashing to the BLS12-381 elliptic curve
RS Wahby, D Boneh
IACR Transactions on Cryptographic Hardware and Embedded Systems, 154-179, 2019
Robust, low-cost, auditable random number generation for embedded system security
B Lampert, RS Wahby, S Leonard, P Levis
Proceedings of the 14th ACM Conference on Embedded Network Sensor Systems CD …, 2016
Radio frequency rectifiers for DC-DC power conversion
RS Wahby
Massachusetts Institute of Technology, 2004
Scaling verifiable computation using efficient set accumulators
A Ozdemir, R Wahby, B Whitehat, D Boneh
29th {USENIX} Security Symposium ({USENIX} Security 20), 2075-2092, 2020
Resonant mems lorentz-force magnetometer using force-feedback and frequency-locked coil excitation
EB Smith, R Wahby, Y Zhou
US Patent 9,588,190, 2017
Hashing to elliptic curves
A Faz-Hernandez, S Scott, N Sullivan, RS Wahby, CA Wood
IETF CFRG Internet-Draft, 2020. https://datatracker. ietf. org/doc/draft …, 2019
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20