NEWS
Print Your Certificate
The 2025 AD Scientific Index is here—explore updated university and researcher rankings!
New! Young University / Institution Rankings 2025
New! The 2025 Edition of the AD Scientific Index is now live!
New! Art & Humanities Rankings 2025
New! Social Sciences and Humanities Rankings 2025
"Exciting Update! The 2025 Edition of the AD Scientific Index is now live!
AD
Scientific Index 2025
Scientist Rankings
University Rankings
Subject Rankings
Country Rankings
login
Login
person_add
Register
insights
H-Index Rankings
insights
i10 Productivity Rankings
format_list_numbered
Citation Rankings
subject
University Subject Rankings
school
Young Universities
format_list_numbered
Top 100 Scientists
format_quote
Top 100 Institutions
format_quote
Compare & Choose
local_fire_department
Country Reports
Huijia Rachel Lin
University of Washington - Seattle / United States
Engineering & Technology / Computer Science
AD Scientific Index ID: 1684741
Registration, Add Profile,
Premium Membership
Print Your Certificate
Ranking &
Analysis
Job
Experiences (0)
Education
Information (0)
Published Books (0)
Book Chapters (0)
Articles (0)
Presentations (0)
Lessons (0)
Projects (0)
Congresses (0)
Editorship, Referee &
Scientific Board (0 )
Patents /
Designs (0)
Academic Grants
& Awards (0)
Artistic
Activities (0)
Certificate / Course
/ Trainings (0)
Association &
Society Memberships (0)
Contact, Office
& Social Media
person_outline
Huijia Rachel Lin's MOST POPULAR ARTICLES
1-)
Indistinguishability obfuscation from well-founded assumptionsA Jain, H Lin, A SahaiProceedings of the 53rd Annual ACM SIGACT Symposium on Theory of Computing …, 20211662021
2-)
The hunting of the SNARKN Bitansky, R Canetti, A Chiesa, S Goldwasser, H Lin, A Rubinstein, ...Journal of Cryptology 30 (4), 989-1066, 20171562017
3-)
Indistinguishability obfuscation from SXDH on 5-linear maps and locality-5 PRGsH LinAnnual International Cryptology Conference, 599-629, 20171582017
4-)
Obfuscation of probabilistic circuits and applicationsR Canetti, H Lin, S Tessaro, V VaikuntanathanTheory of Cryptography: 12th Theory of Cryptography Conference, TCC 2015 …, 20151642015
5-)
RICH: Automatically protecting against integer-based vulnerabilitiesD Brumley, T Chiueh, R Johnson, H Lin, D SongCarnegie Mellon University, 20071602007
ARTICLES
Add your articles
We use cookies to personalize our website and offer you a better experience. If you accept cookies, we can offer you special services.
Cookie Policy
Accept