Publications

Conference Proceedings

Watermarking Cryptographic Functionalities from Standard Lattice Assumptions

Sam Kim and David J. Wu
Crypto 2017 (Best Paper by Young Researchers Award)

Lattice-Based SNARGs and Their Application to More Efficient Obfuscation

Dan Boneh, Yuval Ishai, Amit Sahai, and David J. Wu
Eurocrypt 2017

Functional Encryption: Deterministic to Randomized Functions from Simple Assumptions

Shashank Agrawal and David J. Wu
Eurocrypt 2017

Constraining Pseudorandom Functions Privately

Dan Boneh, Kevin Lewi, and David J. Wu
PKC 2017

Order-Revealing Encryption: New Constructions, Applications, and Lower Bounds

Kevin Lewi and David J. Wu
CCS 2016

Privacy, Discovery, and Authentication for the Internet of Things

David J. Wu, Ankur Taly, Asim Shankar, and Dan Boneh
ESORICS 2016 (Outstanding Paper Award)

Practical Order-Revealing Encryption with Limited Leakage

Nathan Chenette, Kevin Lewi, Stephen A. Weis, and David J. Wu
FSE 2016

Privacy-Preserving Shortest Path Computation

David J. Wu, Joe Zimmerman, Jérémy Planul, and John C. Mitchell
NDSS 2016

Private Database Queries using Somewhat Homomorphic Encryption

Dan Boneh, Craig Gentry, Shai Halevi, Frank Wang, and David J. Wu
ACNS 2013

Deep Learning with COTS HPC Systems

Adam Coates, Brody Huval, Tao Wang, David J. Wu, Andrew Y. Ng, and Bryan Catanzaro
ICML 2013

End-to-End Text Recognition with Convolutional Neural Networks

Tao Wang, David J. Wu, Adam Coates, and Andrew Y. Ng
ICPR 2012

Text Detection and Character Recognition in Scene Images with Unsupervised Feature Learning

Adam Coates, Blake Carpenter, Carl Case, Sanjeev Satheesh, Bipin Suresh, Tao Wang, David J. Wu, and Andrew Y. Ng
ICDAR 2011 (Best Student Paper Award)

Journal Articles

Privately Evaluating Decision Trees and Random Forests

David J. Wu, Tony Feng, Michael Naehrig, and Kristin Lauter
PETS 2016

Workshop Proceedings

Quantum Operating Systems

Henry Corrigan-Gibbs, David J. Wu, and Dan Boneh
HotOS 2017

Manuscripts

Constrained Keys for Invertible Pseudorandom Functions

Dan Boneh, Sam Kim, and David J. Wu

Access Control Encryption for General Policies from Standard Assumptions

Sam Kim and David J. Wu

Revealing the Causative Variant in Mendelian Patient Genomes without Revealing Patient Genomes

Karthik A. Jagadeesh, David J. Wu, Johannes A. Birgmeier, Dan Boneh, and Gill Bejerano

Function-Hiding Inner Product Encryption is Practical

Sam Kim, Kevin Lewi, Avradip Mandal, Hart Montgomery, Arnab Roy, and David J. Wu

Immunizing Multilinear Maps Against Zeroizing Attacks

Dan Boneh, David J. Wu, and Joe Zimmerman

Other Articles

Fully Homomorphic Encryption: Cryptography's Holy Grail

David J. Wu
ACM XRDS 2015