default search action
Hao Chen 0030
- > Home > Persons > Hao Chen 0030
Publications
- 2021
- [c19]Hao Chen, Wei Dai, Miran Kim, Yongsoo Song:
Efficient Homomorphic Conversion Between (Ring) LWE Ciphertexts. ACNS (1) 2021: 460-479 - [c18]Muhammad Haris Mughees, Hao Chen, Ling Ren:
OnionPIR: Response Efficient Single-Server PIR. CCS 2021: 2292-2306 - [c17]Hao Chen, Ilia Iliashenko, Kim Laine:
When HEAAN Meets FV: A New Somewhat Homomorphic Encryption with Reduced Memory Overhead. IMACC 2021: 265-285 - [i29]Muhammad Haris Mughees, Hao Chen, Ling Ren:
OnionPIR: Response Efficient Single-Server PIR. IACR Cryptol. ePrint Arch. 2021: 1081 (2021) - 2020
- [c16]Hao Chen, Miran Kim, Ilya P. Razenshteyn, Dragos Rotaru, Yongsoo Song, Sameer Wagh:
Maliciously Secure Matrix Multiplication with Applications to Private Deep Learning. ASIACRYPT (3) 2020: 31-59 - [c15]Hao Chen, Ilaria Chillotti, Yihe Dong, Oxana Poburinnaya, Ilya P. Razenshteyn, M. Sadegh Riazi:
SANNS: Scaling Up Secure Approximate k-Nearest Neighbors Search. USENIX Security Symposium 2020: 2111-2128 - [i28]Hao Chen, Wei Dai, Miran Kim, Yongsoo Song:
Efficient Homomorphic Conversion Between (Ring) LWE Ciphertexts. IACR Cryptol. ePrint Arch. 2020: 15 (2020) - [i27]Hao Chen, Ilia Iliashenko, Kim Laine:
When HEAAN Meets FV: a New Somewhat Homomorphic Encryption with Reduced Memory Overhead. IACR Cryptol. ePrint Arch. 2020: 121 (2020) - [i26]Hao Chen, Miran Kim, Ilya P. Razenshteyn, Dragos Rotaru, Yongsoo Song, Sameer Wagh:
Maliciously Secure Matrix Multiplication with Applications to Private Deep Learning. IACR Cryptol. ePrint Arch. 2020: 451 (2020) - [i25]Hao Chen, Lynn Chua, Kristin E. Lauter, Yongsoo Song:
On the Concrete Security of LWE with Small Secret. IACR Cryptol. ePrint Arch. 2020: 539 (2020) - 2019
- [c14]Hao Chen, Ilaria Chillotti, Yongsoo Song:
Multi-Key Homomorphic Encryption from TFHE. ASIACRYPT (2) 2019: 446-472 - [c13]Hao Chen, Ilaria Chillotti, Ling Ren:
Onion Ring ORAM: Efficient Constant Bandwidth Oblivious RAM from (Leveled) TFHE. CCS 2019: 345-360 - [c12]Hao Chen, Wei Dai, Miran Kim, Yongsoo Song:
Efficient Multi-Key Homomorphic Encryption with Packed Ciphertexts with Application to Oblivious Neural Network Inference. CCS 2019: 395-412 - [c11]Hao Chen, Ilaria Chillotti, Yongsoo Song:
Improved Bootstrapping for Approximate Homomorphic Encryption. EUROCRYPT (2) 2019: 34-54 - [c10]Roshan Dathathri, Olli Saarikivi, Hao Chen, Kim Laine, Kristin E. Lauter, Saeed Maleki, Madanlal Musuvathi, Todd Mytkowicz:
CHET: an optimizing compiler for fully-homomorphic neural-network inferencing. PLDI 2019: 142-156 - [c9]M. Sadegh Riazi, Mohammad Samragh, Hao Chen, Kim Laine, Kristin E. Lauter, Farinaz Koushanfar:
XONN: XNOR-based Oblivious Deep Neural Network Inference. USENIX Security Symposium 2019: 1501-1518 - [i24]M. Sadegh Riazi, Mohammad Samragh, Hao Chen, Kim Laine, Kristin E. Lauter, Farinaz Koushanfar:
XONN: XNOR-based Oblivious Deep Neural Network Inference. CoRR abs/1902.07342 (2019) - [i23]Hao Chen, Ilaria Chillotti, Yihe Dong, Oxana Poburinnaya, Ilya P. Razenshteyn, M. Sadegh Riazi:
SANNS: Scaling Up Secure Approximate k-Nearest Neighbors Search. CoRR abs/1904.02033 (2019) - [i22]Wenhao Wang, Yichen Jiang, Qintao Shen, Weihao Huang, Hao Chen, Shuang Wang, Xiaofeng Wang, Haixu Tang, Kai Chen, Kristin E. Lauter, Dongdai Lin:
Toward Scalable Fully Homomorphic Encryption Through Light Trusted Computing Assistance. CoRR abs/1905.07766 (2019) - [i21]Hao Chen, Ilaria Chillotti, Yongsoo Song:
Multi-Key Homomophic Encryption from TFHE. IACR Cryptol. ePrint Arch. 2019: 116 (2019) - [i20]M. Sadegh Riazi, Mohammad Samragh, Hao Chen, Kim Laine, Kristin E. Lauter, Farinaz Koushanfar:
XONN: XNOR-based Oblivious Deep Neural Network Inference. IACR Cryptol. ePrint Arch. 2019: 171 (2019) - [i19]Hao Chen, Ilaria Chillotti, Yihe Dong, Oxana Poburinnaya, Ilya P. Razenshteyn, M. Sadegh Riazi:
SANNS: Scaling Up Secure Approximate k-Nearest Neighbors Search. IACR Cryptol. ePrint Arch. 2019: 359 (2019) - [i18]Hao Chen, Wei Dai, Miran Kim, Yongsoo Song:
Efficient Multi-Key Homomorphic Encryption with Packed Ciphertexts with Application to Oblivious Neural Network Inference. IACR Cryptol. ePrint Arch. 2019: 524 (2019) - [i17]Hao Chen, Ilaria Chillotti, Ling Ren:
Onion Ring ORAM: Efficient Constant Bandwidth Oblivious RAM from (Leveled) TFHE. IACR Cryptol. ePrint Arch. 2019: 736 (2019) - [i16]Martin R. Albrecht, Melissa Chase, Hao Chen, Jintai Ding, Shafi Goldwasser, Sergey Gorbunov, Shai Halevi, Jeffrey Hoffstein, Kim Laine, Kristin E. Lauter, Satya Lokam, Daniele Micciancio, Dustin Moody, Travis Morrison, Amit Sahai, Vinod Vaikuntanathan:
Homomorphic Encryption Standard. IACR Cryptol. ePrint Arch. 2019: 939 (2019) - 2018
- [c8]Hao Chen, Zhicong Huang, Kim Laine, Peter Rindal:
Labeled PSI from Fully Homomorphic Encryption with Malicious Security. CCS 2018: 1223-1237 - [c7]Hao Chen, Kim Laine, Rachel Player, Yuhou Xia:
High-Precision Arithmetic in Homomorphic Encryption. CT-RSA 2018: 116-136 - [c6]Hao Chen, Kyoohyung Han:
Homomorphic Lower Digits Removal and Improved FHE Bootstrapping. EUROCRYPT (1) 2018: 315-337 - [c5]Sebastian Angel, Hao Chen, Kim Laine, Srinath T. V. Setty:
PIR with Compressed Queries and Amortized Query Processing. IEEE Symposium on Security and Privacy 2018: 962-979 - [i15]Roshan Dathathri, Olli Saarikivi, Hao Chen, Kim Laine, Kristin E. Lauter, Saeed Maleki, Madanlal Musuvathi, Todd Mytkowicz:
CHET: Compiler and Runtime for Homomorphic Evaluation of Tensor Programs. CoRR abs/1810.00845 (2018) - [i14]Hao Chen, Kyoohyung Han:
Homomorphic Lower Digits Removal and Improved FHE Bootstrapping. IACR Cryptol. ePrint Arch. 2018: 67 (2018) - [i13]Hao Chen, Ran Gilad-Bachrach, Kyoohyung Han, Zhicong Huang, Amir Jalali, Kim Laine, Kristin E. Lauter:
Logistic regression over encrypted data from fully homomorphic encryption. IACR Cryptol. ePrint Arch. 2018: 462 (2018) - [i12]Hao Chen, Zhicong Huang, Kim Laine, Peter Rindal:
Labeled PSI from Fully Homomorphic Encryption with Malicious Security. IACR Cryptol. ePrint Arch. 2018: 787 (2018) - [i11]Hao Chen, Ilaria Chillotti, Yongsoo Song:
Improved Bootstrapping for Approximate Homomorphic Encryption. IACR Cryptol. ePrint Arch. 2018: 1043 (2018) - 2017
- [j1]Hao Chen, Kristin E. Lauter, Katherine E. Stange:
Attacks on the Search RLWE Problem with Small Errors. SIAM J. Appl. Algebra Geom. 1(1): 665-682 (2017) - [c4]Hao Chen, Kim Laine, Peter Rindal:
Fast Private Set Intersection from Homomorphic Encryption. CCS 2017: 1243-1255 - [c3]Hao Chen, Kim Laine, Rachel Player:
Simple Encrypted Arithmetic Library - SEAL v2.1. Financial Cryptography Workshops 2017: 3-18 - [i10]Hao Chen, Kristin E. Lauter, Katherine E. Stange:
Security considerations for Galois non-dual RLWE families. CoRR abs/1710.03316 (2017) - [i9]Hao Chen, Kristin E. Lauter, Katherine E. Stange:
Attacks on the Search-RLWE problem with small errors. CoRR abs/1710.03739 (2017) - [i7]Gizem S. Çetin, Hao Chen, Kim Laine, Kristin E. Lauter, Peter Rindal, Yuhou Xia:
Private Queries on Encrypted Genomic Data. IACR Cryptol. ePrint Arch. 2017: 207 (2017) - [i6]Hao Chen, Kim Laine, Rachel Player:
Simple Encrypted Arithmetic Library - SEAL v2.1. IACR Cryptol. ePrint Arch. 2017: 224 (2017) - [i5]Hao Chen, Kim Laine, Peter Rindal:
Fast Private Set Intersection from Homomorphic Encryption. IACR Cryptol. ePrint Arch. 2017: 299 (2017) - [i4]Hao Chen, Kim Laine, Rachel Player, Yuhou Xia:
High-Precision Arithmetic in Homomorphic Encryption. IACR Cryptol. ePrint Arch. 2017: 809 (2017) - [i3]Sebastian Angel, Hao Chen, Kim Laine, Srinath T. V. Setty:
PIR with compressed queries and amortized query processing. IACR Cryptol. ePrint Arch. 2017: 1142 (2017) - 2016
- [c2]Srinath T. V. Setty, Chunzhi Su, Jacob R. Lorch, Lidong Zhou, Hao Chen, Parveen Patel, Jinglei Ren:
Realizing the Fault-Tolerance Promise of Cloud Storage Using Locks with Intent. OSDI 2016: 501-516 - [c1]Hao Chen, Kristin E. Lauter, Katherine E. Stange:
Security Considerations for Galois Non-dual RLWE Families. SAC 2016: 443-462 - [i2]Hao Chen, Kristin E. Lauter, Katherine E. Stange:
Vulnerable Galois RLWE Families and Improved Attacks. IACR Cryptol. ePrint Arch. 2016: 193 (2016) - 2015
- [i1]Hao Chen, Kristin E. Lauter, Katherine E. Stange:
Attacks on Search RLWE. IACR Cryptol. ePrint Arch. 2015: 971 (2015)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-24 00:21 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint