default search action
David J. Wu 0001
Person information
- affiliation: University of Texas at Austin, Department of Computer Science, TX, USA
- affiliation (former): University of Virginia (UVA), Department of Computer Science, Charlottesville, VA, USA
- affiliation (former, PhD 2018): Stanford University, CA, USA
Other persons with the same name
- David J. Wu 0002 (aka: David Jian Wu) — Meta AI Research, New York, NY, USA (and 2 more)
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c46]Henry Corrigan-Gibbs, David J. Wu:
The One-Wayness of Jacobi Signatures. CRYPTO (5) 2024: 3-13 - [c45]Rachit Garg, George Lu, Brent Waters, David J. Wu:
Reducing the CRS Size in Registered ABE Systems. CRYPTO (3) 2024: 143-177 - [c44]Hoeteck Wee, David J. Wu:
Succinct Functional Commitments for Circuits from k-sfLin. EUROCRYPT (2) 2024: 280-310 - [c43]Brent Waters, David J. Wu:
Adaptively-Sound Succinct Arguments for NP from Indistinguishability Obfuscation. STOC 2024: 387-398 - [c42]Samir Jordan Menon, David J. Wu:
YPIR: High-Throughput Single-Server PIR with Silent Preprocessing. USENIX Security Symposium 2024 - [i54]Nir Bitansky, Ron D. Rothblum, Prahladh Harsha, Yuval Ishai, David J. Wu:
Dot-Product Proofs and Their Applications. Electron. Colloquium Comput. Complex. TR24 (2024) - [i53]Hoeteck Wee, David J. Wu:
Lattice-Based Functional Commitments: Fast Verification and Cryptanalysis. IACR Cryptol. ePrint Arch. 2024: 28 (2024) - [i52]Brent Waters, David J. Wu:
Adaptively-Sound Succinct Arguments for NP from Indistinguishability Obfuscation. IACR Cryptol. ePrint Arch. 2024: 165 (2024) - [i51]Samir Jordan Menon, David J. Wu:
YPIR: High-Throughput Single-Server PIR with Silent Preprocessing. IACR Cryptol. ePrint Arch. 2024: 270 (2024) - [i50]Hoeteck Wee, David J. Wu:
Succinct Functional Commitments for Circuits from k-Lin. IACR Cryptol. ePrint Arch. 2024: 688 (2024) - [i49]Rachit Garg, George Lu, Brent Waters, David J. Wu:
Reducing the CRS Size in Registered ABE Systems. IACR Cryptol. ePrint Arch. 2024: 749 (2024) - [i48]Brent Waters, David J. Wu:
A Pure Indistinguishability Obfuscation Approach to Adaptively-Sound SNARGs for NP. IACR Cryptol. ePrint Arch. 2024: 933 (2024) - [i47]Nir Bitansky, Prahladh Harsha, Yuval Ishai, Ron D. Rothblum, David J. Wu:
Dot-Product Proofs and Their Applications. IACR Cryptol. ePrint Arch. 2024: 1138 (2024) - [i46]Alexander Burton, Samir Jordan Menon, David J. Wu:
Respire: High-Rate PIR for Databases with Small Records. IACR Cryptol. ePrint Arch. 2024: 1165 (2024) - [i45]Henry Corrigan-Gibbs, David J. Wu:
Legendre Sequences are Pseudorandom under the Quadratic-Residuosity Assumption. IACR Cryptol. ePrint Arch. 2024: 1252 (2024) - [i44]Brent Waters, Hoeteck Wee, David J. Wu:
New Techniques for Preimage Sampling: Improved NIZKs and More from LWE. IACR Cryptol. ePrint Arch. 2024: 1401 (2024) - [i43]Jeffrey Champion, David J. Wu:
Distributed Broadcast Encryption from Lattices. IACR Cryptol. ePrint Arch. 2024: 1417 (2024) - 2023
- [c41]Hoeteck Wee, David J. Wu:
Lattice-Based Functional Commitments: Fast Verification and Cryptanalysis. ASIACRYPT (5) 2023: 201-235 - [c40]Rachit Garg, George Lu, Brent Waters, David J. Wu:
Realizing Flexible Broadcast Encryption: How to Broadcast to a Public-Key Directory. CCS 2023: 1093-1107 - [c39]Jeffrey Champion, David J. Wu:
Non-interactive Zero-Knowledge from Non-interactive Batch Arguments. CRYPTO (2) 2023: 38-71 - [c38]Cody Freitag, Brent Waters, David J. Wu:
How to Use (Plain) Witness Encryption: Registered ABE, Flexible Broadcast, and More. CRYPTO (4) 2023: 498-531 - [c37]Hoeteck Wee, David J. Wu:
Succinct Vector, Polynomial, and Functional Commitments from Lattices. EUROCRYPT (3) 2023: 385-416 - [c36]Susan Hohenberger, George Lu, Brent Waters, David J. Wu:
Registered Attribute-Based Encryption. EUROCRYPT (3) 2023: 511-542 - [c35]Simone Colombo, Kirill Nikitin, Henry Corrigan-Gibbs, David J. Wu, Bryan Ford:
Authenticated private information retrieval. USENIX Security Symposium 2023: 3835-3851 - [i42]Simone Colombo, Kirill Nikitin, Henry Corrigan-Gibbs, David J. Wu, Bryan Ford:
Authenticated private information retrieval. IACR Cryptol. ePrint Arch. 2023: 297 (2023) - [i41]Jeffrey Champion, David J. Wu:
Non-Interactive Zero-Knowledge from Non-Interactive Batch Arguments. IACR Cryptol. ePrint Arch. 2023: 695 (2023) - [i40]Cody Freitag, Brent Waters, David J. Wu:
How to Use (Plain) Witness Encryption: Registered ABE, Flexible Broadcast, and More. IACR Cryptol. ePrint Arch. 2023: 812 (2023) - [i39]Rachit Garg, George Lu, Brent Waters, David J. Wu:
Realizing Flexible Broadcast Encryption: How to Broadcast to a Public-Key Directory. IACR Cryptol. ePrint Arch. 2023: 1583 (2023) - [i38]Henry Corrigan-Gibbs, David J. Wu:
The One-Wayness of Jacobi Signatures. IACR Cryptol. ePrint Arch. 2023: 1638 (2023) - [i37]Eli Bradley, Brent Waters, David J. Wu:
Batch Arguments to NIZKs from One-Way Functions. IACR Cryptol. ePrint Arch. 2023: 1938 (2023) - [i36]Shafik Nassar, Brent Waters, David J. Wu:
Monotone Policy BARGs from BARGs and Additively Homomorphic Encryption. IACR Cryptol. ePrint Arch. 2023: 1967 (2023) - 2022
- [c34]Brent Waters, David J. Wu:
Batch Arguments for sfNP and More from Standard Bilinear Group Assumptions. CRYPTO (2) 2022: 433-463 - [c33]Sarasij Maitra, David J. Wu:
Traceable PRFs: Full Collusion Resistance and Active Security. Public Key Cryptography (1) 2022: 439-469 - [c32]Samir Jordan Menon, David J. Wu:
SPIRAL: Fast, High-Rate Single-Server PIR via FHE Composition. SP 2022: 930-947 - [c31]Rachit Garg, Kristin Sheridan, Brent Waters, David J. Wu:
Fully Succinct Batch Arguments for sfNP from Indistinguishability Obfuscation. TCC (1) 2022: 526-555 - [c30]Brent Waters, Hoeteck Wee, David J. Wu:
Multi-authority ABE from Lattices Without Random Oracles. TCC (1) 2022: 651-679 - [i35]Brent Waters, David J. Wu:
Batch Arguments for NP and More from Standard Bilinear Group Assumptions. IACR Cryptol. ePrint Arch. 2022: 336 (2022) - [i34]Samir Jordan Menon, David J. Wu:
Spiral: Fast, High-Rate Single-Server PIR via FHE Composition. IACR Cryptol. ePrint Arch. 2022: 368 (2022) - [i33]Brent Waters, Hoeteck Wee, David J. Wu:
Multi-Authority ABE from Lattices without Random Oracles. IACR Cryptol. ePrint Arch. 2022: 1194 (2022) - [i32]Susan Hohenberger, George Lu, Brent Waters, David J. Wu:
Registered Attribute-Based Encryption. IACR Cryptol. ePrint Arch. 2022: 1500 (2022) - [i31]Hoeteck Wee, David J. Wu:
Succinct Vector, Polynomial, and Functional Commitments from Lattices. IACR Cryptol. ePrint Arch. 2022: 1515 (2022) - [i30]Rachit Garg, Kristin Sheridan, Brent Waters, David J. Wu:
Fully Succinct Batch Arguments for NP from Indistinguishability Obfuscation. IACR Cryptol. ePrint Arch. 2022: 1760 (2022) - 2021
- [j5]Sam Kim, David J. Wu:
Watermarking Cryptographic Functionalities from Standard Lattice Assumptions. J. Cryptol. 34(3): 28 (2021) - [j4]Jacob A. Blindenbach, Karthik Anand Jagadeesh, Gill Bejerano, David J. Wu:
Avoiding genetic racial profiling in criminal DNA profile databases. Nat. Comput. Sci. 1(4): 272-279 (2021) - [c29]Rishab Goyal, Sam Kim, Brent Waters, David J. Wu:
Beyond Software Watermarking: Traitor-Tracing for Pseudorandom Functions. ASIACRYPT (3) 2021: 250-280 - [c28]Yuval Ishai, Hang Su, David J. Wu:
Shorter and Faster Post-Quantum Designated-Verifier zkSNARKs from Lattices. CCS 2021: 212-234 - [c27]Sijun Tan, Brian Knott, Yuan Tian, David J. Wu:
CryptGPU: Fast Privacy-Preserving Machine Learning on the GPU. SP 2021: 1021-1038 - [i29]Sijun Tan, Brian Knott, Yuan Tian, David J. Wu:
CryptGPU: Fast Privacy-Preserving Machine Learning on the GPU. CoRR abs/2104.10949 (2021) - [i28]Sijun Tan, Brian Knott, Yuan Tian, David J. Wu:
CryptGPU: Fast Privacy-Preserving Machine Learning on the GPU. IACR Cryptol. ePrint Arch. 2021: 533 (2021) - [i27]Yuval Ishai, Hang Su, David J. Wu:
Shorter and Faster Post-Quantum Designated-Verifier zkSNARKs from Lattices. IACR Cryptol. ePrint Arch. 2021: 977 (2021) - [i26]Sarasij Maitra, David J. Wu:
Traceable PRFs: Full Collusion Resistance and Active Security. IACR Cryptol. ePrint Arch. 2021: 1675 (2021) - 2020
- [j3]Sam Kim, David J. Wu:
Multi-theorem Preprocessing NIZKs from Lattices. J. Cryptol. 33(3): 619-702 (2020) - [c26]Sam Kim, David J. Wu:
Collusion Resistant Trace-and-Revoke for Arbitrary Identities from Standard Assumptions. ASIACRYPT (2) 2020: 66-97 - [c25]Ohad Barta, Yuval Ishai, Rafail Ostrovsky, David J. Wu:
On Succinct Arguments and Witness Encryption from Groups. CRYPTO (1) 2020: 776-806 - [c24]Benoît Libert, Alain Passelègue, Hoeteck Wee, David J. Wu:
New Constructions of Statistical NIZKs: Dual-Mode DV-NIZKs and More. EUROCRYPT (3) 2020: 410-441 - [c23]Mohammad Mahmoody, Caleb Smith, David J. Wu:
Can Verifiable Delay Functions Be Based on Random Oracles? ICALP 2020: 83:1-83:17 - [i25]Benoît Libert, Alain Passelègue, Hoeteck Wee, David J. Wu:
New Constructions of Statistical NIZKs: Dual-Mode DV-NIZKs and More. IACR Cryptol. ePrint Arch. 2020: 265 (2020) - [i24]Rishab Goyal, Sam Kim, Brent Waters, David J. Wu:
Beyond Software Watermarking: Traitor-Tracing for Pseudorandom Functions. IACR Cryptol. ePrint Arch. 2020: 316 (2020) - [i23]Ohad Barta, Yuval Ishai, Rafail Ostrovsky, David J. Wu:
On Succinct Arguments and Witness Encryption from Groups. IACR Cryptol. ePrint Arch. 2020: 1319 (2020)
2010 – 2019
- 2019
- [c22]Sam Kim, David J. Wu:
Watermarking PRFs from Lattices: Stronger Security via Extractable PRFs. CRYPTO (3) 2019: 335-366 - [c21]Rishab Goyal, Sam Kim, Nathan Manohar, Brent Waters, David J. Wu:
Watermarking Public-Key Cryptographic Primitives. CRYPTO (3) 2019: 367-398 - [c20]Alex Lombardi, Willy Quach, Ron D. Rothblum, Daniel Wichs, David J. Wu:
New Constructions of Reusable Designated-Verifier NIZKs. CRYPTO (3) 2019: 670-700 - [i22]Alex Lombardi, Willy Quach, Ron D. Rothblum, Daniel Wichs, David J. Wu:
New Constructions of Reusable Designated-Verifier NIZKs. IACR Cryptol. ePrint Arch. 2019: 242 (2019) - [i21]Rishab Goyal, Sam Kim, Nathan Manohar, Brent Waters, David J. Wu:
Watermarking Public-Key Cryptographic Primitives. IACR Cryptol. ePrint Arch. 2019: 628 (2019) - [i20]Mohammad Mahmoody, Caleb Smith, David J. Wu:
A Note on the (Im)possibility of Verifiable Delay Functions in the Random Oracle Model. IACR Cryptol. ePrint Arch. 2019: 663 (2019) - [i19]Sam Kim, David J. Wu:
Collusion Resistant Trace-and-Revoke for Arbitrary Identities from Standard Assumptions. IACR Cryptol. ePrint Arch. 2019: 984 (2019) - 2018
- [b1]David J. Wu:
Lattice-based non-interactive argument systems. Stanford University, USA, 2018 - [c19]Sam Kim, David J. Wu:
Multi-Theorem Preprocessing NIZKs from Lattices. CRYPTO (2) 2018: 733-765 - [c18]Dan Boneh, Yuval Ishai, Amit Sahai, David J. Wu:
Quasi-Optimal SNARGs via Linear Multi-Prover Interactive Proofs. EUROCRYPT (3) 2018: 222-255 - [c17]Sam Kim, Kevin Lewi, Avradip Mandal, Hart Montgomery, Arnab Roy, David J. Wu:
Function-Hiding Inner Product Encryption Is Practical. SCN 2018: 544-562 - [c16]Dan Boneh, Yuval Ishai, Alain Passelègue, Amit Sahai, David J. Wu:
Exploring Crypto Dark Matter: - New Simple PRF Candidates and Their Applications. TCC (2) 2018: 699-729 - [i18]Dan Boneh, Yuval Ishai, Amit Sahai, David J. Wu:
Quasi-Optimal SNARGs via Linear Multi-Prover Interactive Proofs. IACR Cryptol. ePrint Arch. 2018: 133 (2018) - [i17]Sam Kim, David J. Wu:
Multi-Theorem Preprocessing NIZKs from Lattices. IACR Cryptol. ePrint Arch. 2018: 272 (2018) - [i16]Sam Kim, David J. Wu:
Watermarking PRFs from Lattices: Stronger Security via Extractable PRFs. IACR Cryptol. ePrint Arch. 2018: 986 (2018) - [i15]Dan Boneh, Yuval Ishai, Alain Passelègue, Amit Sahai, David J. Wu:
Exploring Crypto Dark Matter: New Simple PRF Candidates and Their Applications. IACR Cryptol. ePrint Arch. 2018: 1218 (2018) - 2017
- [c15]Sam Kim, David J. Wu:
Access Control Encryption for General Policies from Standard Assumptions. ASIACRYPT (1) 2017: 471-501 - [c14]Sam Kim, David J. Wu:
Watermarking Cryptographic Functionalities from Standard Lattice Assumptions. CRYPTO (1) 2017: 503-536 - [c13]Shashank Agrawal, David J. Wu:
Functional Encryption: Deterministic to Randomized Functions from Simple Assumptions. EUROCRYPT (2) 2017: 30-61 - [c12]Dan Boneh, Yuval Ishai, Amit Sahai, David J. Wu:
Lattice-Based SNARGs and Their Application to More Efficient Obfuscation. EUROCRYPT (3) 2017: 247-277 - [c11]Henry Corrigan-Gibbs, David J. Wu, Dan Boneh:
Quantum Operating Systems. HotOS 2017: 76-81 - [c10]Dan Boneh, Kevin Lewi, David J. Wu:
Constraining Pseudorandom Functions Privately. Public Key Cryptography (2) 2017: 494-524 - [c9]Dan Boneh, Sam Kim, David J. Wu:
Constrained Keys for Invertible Pseudorandom Functions. TCC (1) 2017: 237-263 - [i14]Dan Boneh, Yuval Ishai, Amit Sahai, David J. Wu:
Lattice-Based SNARGs and Their Application to More Efficient Obfuscation. IACR Cryptol. ePrint Arch. 2017: 240 (2017) - [i13]Sam Kim, David J. Wu:
Watermarking Cryptographic Functionalities from Standard Lattice Assumptions. IACR Cryptol. ePrint Arch. 2017: 380 (2017) - [i12]Sam Kim, David J. Wu:
Access Control Encryption for General Policies from Standard Assumptions. IACR Cryptol. ePrint Arch. 2017: 467 (2017) - [i11]Dan Boneh, Sam Kim, David J. Wu:
Constrained Keys for Invertible Pseudorandom Functions. IACR Cryptol. ePrint Arch. 2017: 477 (2017) - 2016
- [j2]David J. Wu, Tony Feng, Michael Naehrig, Kristin E. Lauter:
Privately Evaluating Decision Trees and Random Forests. Proc. Priv. Enhancing Technol. 2016(4): 335-355 (2016) - [c8]Kevin Lewi, David J. Wu:
Order-Revealing Encryption: New Constructions, Applications, and Lower Bounds. CCS 2016: 1167-1178 - [c7]David J. Wu, Ankur Taly, Asim Shankar, Dan Boneh:
Privacy, Discovery, and Authentication for the Internet of Things. ESORICS (2) 2016: 301-319 - [c6]Nathan Chenette, Kevin Lewi, Stephen A. Weis, David J. Wu:
Practical Order-Revealing Encryption with Limited Leakage. FSE 2016: 474-493 - [c5]David J. Wu, Joe Zimmerman, Jérémy Planul, John C. Mitchell:
Privacy-Preserving Shortest Path Computation. NDSS 2016 - [i10]David J. Wu, Joe Zimmerman, Jérémy Planul, John C. Mitchell:
Privacy-Preserving Shortest Path Computation. CoRR abs/1601.02281 (2016) - [i9]David J. Wu, Ankur Taly, Asim Shankar, Dan Boneh:
Privacy, Discovery, and Authentication for the Internet of Things. CoRR abs/1604.06959 (2016) - [i8]Sam Kim, Kevin Lewi, Avradip Mandal, Hart William Montgomery, Arnab Roy, David J. Wu:
Function-Hiding Inner Product Encryption is Practical. IACR Cryptol. ePrint Arch. 2016: 440 (2016) - [i7]Shashank Agrawal, David J. Wu:
Functional Encryption: Deterministic to Randomized Functions from Simple Assumptions. IACR Cryptol. ePrint Arch. 2016: 482 (2016) - [i6]Kevin Lewi, David J. Wu:
Order-Revealing Encryption: New Constructions, Applications, and Lower Bounds. IACR Cryptol. ePrint Arch. 2016: 612 (2016) - 2015
- [j1]David J. Wu:
Fully Homomorphic Encryption: Cryptography's holy grail. XRDS 21(3): 24-29 (2015) - [i5]David J. Wu, Tony Feng, Michael Naehrig, Kristin E. Lauter:
Privately Evaluating Decision Trees and Random Forests. IACR Cryptol. ePrint Arch. 2015: 386 (2015) - [i4]Nathan Chenette, Kevin Lewi, Stephen A. Weis, David J. Wu:
Practical Order-Revealing Encryption with Limited Leakage. IACR Cryptol. ePrint Arch. 2015: 1125 (2015) - [i3]Dan Boneh, Kevin Lewi, David J. Wu:
Constraining Pseudorandom Functions Privately. IACR Cryptol. ePrint Arch. 2015: 1167 (2015) - 2014
- [i2]Dan Boneh, David J. Wu, Joe Zimmerman:
Immunizing Multilinear Maps Against Zeroizing Attacks. IACR Cryptol. ePrint Arch. 2014: 930 (2014) - 2013
- [c4]Dan Boneh, Craig Gentry, Shai Halevi, Frank Wang, David J. Wu:
Private Database Queries Using Somewhat Homomorphic Encryption. ACNS 2013: 102-118 - [c3]Adam Coates, Brody Huval, Tao Wang, David J. Wu, Bryan Catanzaro, Andrew Y. Ng:
Deep learning with COTS HPC systems. ICML (3) 2013: 1337-1345 - [i1]Dan Boneh, Craig Gentry, Shai Halevi, Frank Wang, David J. Wu:
Private Database Queries Using Somewhat Homomorphic Encryption. IACR Cryptol. ePrint Arch. 2013: 422 (2013) - 2012
- [c2]Tao Wang, David J. Wu, Adam Coates, Andrew Y. Ng:
End-to-end text recognition with convolutional neural networks. ICPR 2012: 3304-3308 - 2011
- [c1]Adam Coates, Blake Carpenter, Carl Case, Sanjeev Satheesh, Bipin Suresh, Tao Wang, David J. Wu, Andrew Y. Ng:
Text Detection and Character Recognition in Scene Images with Unsupervised Feature Learning. ICDAR 2011: 440-445
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 01:24 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint