Publications

SCORAM: Oblivious RAM for Secure Computation. 
Xiao Wang, Yan Huang, T-H. Hubert Chan, Abhi Shelat, Elaine Shi
The 21st ACM Conference on Computer and Communications Security (CCS), Scottsdale, Arizona, USA, November 3-7, 2014 [pdf, 12 pages]

Oblivious Data Structures. 
Xiao Wang, Kartik Nayak, Chang Liu, T-H. Hubert Chan, Elaine Shi, Emil Stefanov, Yan Huang
The 21st ACM Conference on Computer and Communications Security (CCS), Scottsdale, Arizona, USA, November 3-7, 2014 [pdf, 12 pages]

Amortizing Garbled Circuits. 
Yan Huang, Jonathan Katz, Vladimir Kolesnikov, Ranjit Kumaresan, Alex J. Malozemoff
The 34th Annual Cryptology Conference (CRYPTO), Santa Barbara, USA, August 17-21, 2014 [pdf, 18 pages]

Automating Efficient RAM-Model Secure Computation. 
Chang Liu, Yan Huang, Elaine Shi, Jonathan Katz, Michael Hicks
The 35th IEEE Symposium on Security & Privacy, San Jose. May 18-21, 2014

Efficient Secure Two-Party Computation Using Symmetric Cut-and-Choose.
Yan Huang
, Jonathan Katz, David Evans
The 33rd Annual Cryptology Conference (CRYPTO), Santa Barbara, USA, August 18-22, 2013 [pdf, 16 pages] [slides] [1 citation]

Quid-Pro-Quo-tocols: Strengthening Semi-Honest Protocols with Symmetric Execution.
Yan Huang, Jonathan Katz, David Evans
The 33rd IEEE Symposium on Security & Privacy, San Francisco. May 20-23, 2012 [pdf, 13 pages] [slides] [20 citations] 2012 AT&T Best Applied Security Paper Award Finalist

Private Set Intersection: Are Garbled Circuits Better than Custom Protocols?
Yan Huang
, David Evans, Jonathan Katz
The 19th Network and Distributed System Security Symposium, San Diego, USA, Feb 5-8, 2012 [pdf, 15 pages] [slides] [39 citations]

Faster Secure Two-Party Computation Using Garbled Circuits.
Yan Huang
, David Evans, Jonathan Katz, and Lior Malka.
The 20th USENIX Security Symposium, San Francisco, CA. August 8-12, 2011. [pdf, 16 pages] [slides] [123 citations2011 AT&T Best Applied Security Paper Award Finalist

Privacy-Preserving Applications on Smartphones.
Yan Huang, Peter Chapman, and David Evans.
The 6th USENIX Workshop on Hot Topics in Security (HotSec 2011), San Francisco. August 9, 2011. [pdf, 6 pages] [22 citations]

Private Editing Using Untrusted Cloud Services.
Yan Huang and David Evans.
The 2nd International Workshop on Security and Privacy in Cloud Computing. Minneapolis, MN. June 24, 2011. [pdf, 10 pages] [8 citations]

Efficient Privacy-Preserving Biometric Identification.
Yan Huang, Lior Malka, David Evans, and Jonathan Katz.
The 18th Network and Distributed System Security Symposium (NDSS). San Diego, CA. February 6-9, 2011. [PDF, 14 pages] [slides] [36 citations]

Invited Papers

Efficient Secure Computation with Garbled Circuits.
Yan Huang, Chih-hao Shen, David Evans, Jonathan Katz, and abhi shelat.
The 7th International Conference on Information Systems Security (ICISS). Kolkata, India, December 15-19, 2011. [pdf, 21 pages] [8 citations]

Ph.D Dissertation
Practical Secure Two-Party Computation, August 2012 [pdf, 121 pages]