Path ORAM: an extremely simple oblivious RAM protocol E Stefanov, M Dijk, E Shi, THH Chan, C Fletcher, L Ren, X Yu, S Devadas
Journal of the ACM (JACM) 65 (4), 1-26, 2018
1282 2018 Multi-dimensional range query over encrypted data E Shi, J Bethencourt, THH Chan, D Song, A Perrig
2007 IEEE Symposium on Security and Privacy (SP'07), 350-364, 2007
754 2007 Private and continual release of statistics THH Chan, E Shi, D Song
ACM Transactions on Information and System Security (TISSEC) 14 (3), 1-24, 2011
627 2011 Oblivious RAM with O ((logN )3 ) Worst-Case Cost E Shi, THH Chan, E Stefanov, M Li
Advances in Cryptology–ASIACRYPT 2011: 17th International Conference on the …, 2011
560 2011 Circuit oram: On tightness of the goldreich-ostrovsky lower bound X Wang, H Chan, E Shi
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
361 2015 Oblivious data structures XS Wang, K Nayak, C Liu, THH Chan, E Shi, E Stefanov, Y Huang
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
276 2014 Privacy-preserving stream aggregation with fault tolerance THH Chan, E Shi, D Song
Financial Cryptography and Data Security: 16th International Conference, FC …, 2012
269 2012 SCORAM: oblivious RAM for secure computation XS Wang, Y Huang, THH Chan, A Shelat, E Shi
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
203 2014 On hierarchical routing in doubling metrics THH Chan, A Gupta, BM Maggs, S Zhou
ACM Transactions on Algorithms (TALG) 12 (4), 1-22, 2016
167 2016 How to vote privately using bitcoin Z Zhao, THH Chan
Information and Communications Security: 17th International Conference …, 2016
159 2016 Communication complexity of byzantine agreement, revisited I Abraham, THH Chan, D Dolev, K Nayak, R Pass, L Ren, E Shi
Proceedings of the 2019 ACM Symposium on Principles of Distributed Computing …, 2019
147 2019 Differentially private continual monitoring of heavy hitters from distributed streams THH Chan, M Li, E Shi, W Xu
Privacy Enhancing Technologies: 12th International Symposium, PETS 2012 …, 2012
142 2012 Optimal lower bound for differentially private multi-party aggregation THH Chan, E Shi, D Song
European Symposium on Algorithms, 277-288, 2012
131 2012 A random-surfer web-graph model A Blum, THH Chan, MR Rwebangira
2006 Proceedings of the Third Workshop on Analytic Algorithmics and …, 2006
100 2006 Spectral properties of hypergraph laplacian and approximation algorithms THH Chan, A Louis, ZG Tang, C Zhang
Journal of the ACM (JACM) 65 (3), 1-48, 2018
99 2018 Finding subgraphs with maximum total density and limited overlap OD Balalau, F Bonchi, THH Chan, F Gullo, M Sozio
Proceedings of the Eighth ACM International Conference on Web Search and …, 2015
98 2015 Privacy-preserving aggregation of Time-series data R Shi, R Chow, THH Chan
US Patent 8,555,400, 2013
94 2013 Pala: A simple partially synchronous blockchain THH Chan, R Pass, E Shi
Cryptology ePrint Archive, 2018
84 2018 C C : A Framework for Building Composable Zero-Knowledge Proofs A Kosba, Z Zhao, A Miller, Y Qian, H Chan, C Papamanthou, R Pass, ...
Cryptology ePrint Archive, 2015
81 2015 Large scale density-friendly graph decomposition via convex programming M Danisch, THH Chan, M Sozio
Proceedings of the 26th International Conference on World Wide Web, 233-242, 2017
80 2017