Follow
Baiyu Li
Baiyu Li
Google
Verified email at cs.ucsd.edu - Homepage
Title
Cited by
Cited by
Year
Skypemorph: Protocol obfuscation for tor bridges
H Mohajeri Moghaddam, B Li, M Derakhshani, I Goldberg
Proceedings of the 2012 ACM conference on Computer and communications …, 2012
3162012
On the security of homomorphic encryption on approximate numbers
B Li, D Micciancio
Advances in Cryptology–EUROCRYPT 2021: 40th Annual International Conference …, 2021
2152021
Quotient complexity of ideal languages
J Brzozowski, G Jirásková, B Li
Theoretical Computer Science 470, 36-52, 2013
722013
Semi-parallel logistic regression for GWAS on encrypted data
M Kim, Y Song, B Li, D Micciancio
BMC Medical Genomics 13, 1-13, 2020
712020
Securing approximate homomorphic encryption using differential privacy
B Li, D Micciancio, M Schultz, J Sorrell
Advances in Cryptology–CRYPTO 2022: 42nd Annual International Cryptology …, 2022
652022
Homomorphic encryption for finite automata
N Genise, C Gentry, S Halevi, B Li, D Micciancio
Advances in Cryptology–ASIACRYPT 2019: 25th International Conference on the …, 2019
512019
{ACORN}: Input Validation for Secure Aggregation
J Bell, A Gascón, T Lepoint, B Li, S Meiklejohn, M Raykova, C Yun
32nd USENIX Security Symposium (USENIX Security 23), 4805-4822, 2023
492023
Compactness vs collusion resistance in functional encryption
B Li, D Micciancio
Theory of Cryptography: 14th International Conference, TCC 2016-B, Beijing …, 2016
332016
Syntactic complexity of prefix-, suffix-, bifix-, and factor-free regular languages
J Brzozowski, B Li, Y Ye
Theoretical Computer Science 449, 37-53, 2012
332012
SYNTACTIC COMPLEXITY OF ℛ-AND 𝒥-TRIVIAL REGULAR LANGUAGES
J Brzozowski, B Li
International Journal of Foundations of Computer Science 25 (07), 807-821, 2014
21*2014
Equational security proofs of oblivious transfer protocols
B Li, D Micciancio
Public-Key Cryptography–PKC 2018: 21st IACR International Conference on …, 2018
202018
Syntactic complexities of six classes of star-free languages
J Brzozowski, B Li, D Liu
Otto-von-Guericke-Universit¨ at Magdeburg, 2012
152012
Hintless single-server private information retrieval
B Li, D Micciancio, M Raykova, M Schultz-Wu
Annual International Cryptology Conference, 183-217, 2024
82024
Gadget-based iNTRU lattice trapdoors
N Genise, B Li
Progress in Cryptology–INDOCRYPT 2020: 21st International Conference on …, 2020
82020
Syntactic complexities of some classes of star-free languages
J Brzozowski, B Li
International Workshop on Descriptional Complexity of Formal Systems, 117-129, 2012
82012
Symbolic security of garbled circuits
B Li, D Micciancio
2018 IEEE 31st Computer Security Foundations Symposium (CSF), 147-161, 2018
62018
Syntactic Complexities of Nine Subclasses of Regular Languages
B Li
University of Waterloo, 2012
32012
Computationally secure aggregation and private information retrieval in the shuffle model
A Gascón, Y Ishai, M Kelkar, B Li, Y Ma, M Raykova
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and …, 2024
22024
Willow: Secure Aggregation with One-Shot Clients
J Bell-Clark, A Gascón, B Li, M Raykova, P Schoppmann
Cryptology ePrint Archive, 2024
22024
On the complexity of the evaluation of transient extensions of boolean functions
J Brzozowski, B Li, Y Ye
International Journal of Foundations of Computer Science 23 (01), 21-35, 2012
22012
The system can't perform the operation now. Try again later.
Articles 1–20