Export 3 results:
Filters: Author is Yan Huang  [Clear All Filters]
Zhu R, Huang Y, Katz J, Shelat A.  2016.  The Cut-and-Choose Game and Its Application to Cryptographic Protocols. 25th USENIX Security Symposium (USENIX Security 16). :1085--1100.
Huang Y, Evans D, Katz J, Malka L.  2011.  Faster Secure Two-Party Computation Using Garbled Circuits. 20th USENIX Security Symposium (USENIX Security 11).
Huang Y, Chapman P, Evans D.  2011.  Privacy-Preserving Applications on Smartphones. 6th USENIX Workshop on Hot Topics in Security (HotSec 11).