Ni Trieu

Assistant Professor

Calculated based on number of publications stored in Pure and citations from Scopus
20152023

Research activity per year

Search results

  • 2023

    Fast ORAM with Server-Aided Preprocessing and Pragmatic Privacy-Efficiency Trade-Off

    Kolesnikov, V., Peceny, S., Trieu, N. & Wang, X., 2023, Cyber Security, Cryptology, and Machine Learning - 7th International Symposium, CSCML 2023, Proceedings. Dolev, S., Gudes, E. & Paillier, P. (eds.). Springer Science and Business Media Deutschland GmbH, p. 439-457 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13914 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Privacy-Preserving Digital Vaccine Passport

    Duong, T., Gao, J., Phan, D. H. & Trieu, N., 2023, Cryptology and Network Security - 22nd International Conference, CANS 2023, Proceedings. Deng, J., Kolesnikov, V. & Schwarzmann, A. A. (eds.). Springer Science and Business Media Deutschland GmbH, p. 137-161 25 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 14342 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Quantum-based Distributed Algorithms for Edge Node Placement and Workload Allocation

    Do, D. T., Trieu, N. & Nguyen, D. T., 2023, Proceedings - 2023 IEEE Cloud Summit, Cloud Summit 2023. Institute of Electrical and Electronics Engineers Inc., p. 52-57 6 p. (Proceedings - 2023 IEEE Cloud Summit, Cloud Summit 2023).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
  • 2022

    COVID-19 and cybersecurity

    Di Pietro, R., Trieu, N. & Iovino, V., Sep 2022, In: IET Information Security. 16, 5, p. 321-323 3 p.

    Research output: Contribution to journalEditorialpeer-review

    Open Access
  • MPCCache: Privacy-Preserving Multi-Party Cooperative Cache Sharing at the Edge

    Nguyen, D. T. & Trieu, N., 2022, Financial Cryptography and Data Security - 26th International Conference, FC 2022, Revised Selected Papers. Eyal, I. & Garay, J. (eds.). Springer Science and Business Media Deutschland GmbH, p. 80-99 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13411 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Scopus citations
  • Privacy-preserving prescription drug management using fully homomorphic encryption

    Shahverdi, A., Trieu, N., Weng, C. & Youmans, W., Jan 4 2022, Protecting Privacy through Homomorphic Encryption. Springer International Publishing, p. 169-176 8 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  • Secure contact tracing platform from simplest private set intersection cardinality

    Gao, J., Surana, C. & Trieu, N., Sep 2022, In: IET Information Security. 16, 5, p. 346-361 16 p.

    Research output: Contribution to journalArticlepeer-review

    Open Access
    2 Scopus citations
  • Two-Stage Robust Edge Service Placement and Sizing under Demand Uncertainty

    Nguyen, D. T., Nguyen, H. T., Trieu, N. & Bhargava, V. K., Jan 15 2022, In: IEEE Internet of Things Journal. 9, 2, p. 1560-1574 15 p.

    Research output: Contribution to journalArticlepeer-review

    7 Scopus citations
  • 2021

    Compact and Malicious Private Set Intersection for Small Sets

    Rosulek, M. & Trieu, N., Nov 12 2021, CCS 2021 - Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 1166-1181 16 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    29 Scopus citations
  • Oblivious Key-Value Stores and Amplification for Private Set Intersection

    Garimella, G., Pinkas, B., Rosulek, M., Trieu, N. & Yanai, A., 2021, Advances in Cryptology – CRYPTO 2021 - 41st Annual International Cryptology Conference, CRYPTO 2021, Proceedings. Malkin, T. & Peikert, C. (eds.). Springer Science and Business Media Deutschland GmbH, p. 395-425 31 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12826 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    35 Scopus citations
  • Private Join and Compute from PIR with Default

    Lepoint, T., Patel, S., Raykova, M., Seth, K. & Trieu, N., 2021, Advances in Cryptology – ASIACRYPT 2021 - 27th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings, Part 2. Tibouchi, M. & Wang, H. (eds.). Springer Science and Business Media Deutschland GmbH, p. 605-634 30 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13091 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Scopus citations
  • Simple, Fast Malicious Multiparty Private Set Intersection

    Nevo, O., Trieu, N. & Yanai, A., Nov 12 2021, CCS 2021 - Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 1151-1165 15 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    27 Scopus citations
  • 2020

    Catalic: Delegated PSI Cardinality with Applications to Contact Tracing

    Duong, T., Phan, D. H. & Trieu, N., 2020, Advances in Cryptology – ASIACRYPT 2020 - 26th International Conference on the Theory and Application of Cryptology and Information Security, 2020, Proceedings. Moriai, S. & Wang, H. (eds.). Springer Science and Business Media Deutschland GmbH, p. 870-899 30 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12493 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    32 Scopus citations
  • PSI from PaXoS: Fast, Malicious Private Set Intersection

    Pinkas, B., Rosulek, M., Trieu, N. & Yanai, A., 2020, Advances in Cryptology – EUROCRYPT 2020 - 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. Canteaut, A. & Ishai, Y. (eds.). Springer, p. 739-767 29 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12106 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    81 Scopus citations
  • 2019

    Attacks only get better: How to break FF3 on large domains

    Hoang, V. T., Miller, D. & Trieu, N., 2019, Advances in Cryptology – EUROCRYPT 2019 - 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. Rijmen, V. & Ishai, Y. (eds.). Springer Verlag, p. 85-116 32 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11477 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Scopus citations
  • Scalable Private Set Union from Symmetric-Key Techniques

    Kolesnikov, V., Rosulek, M., Trieu, N. & Wang, X., 2019, Advances in Cryptology – ASIACRYPT 2019 - 25th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. Galbraith, S. D. & Moriai, S. (eds.). Springer Science and Business Media Deutschland GmbH, p. 636-666 31 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11922 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    22 Scopus citations
  • SpOT-Light: Lightweight Private Set Intersection from Sparse OT Extension

    Pinkas, B., Rosulek, M., Trieu, N. & Yanai, A., 2019, Advances in Cryptology – CRYPTO 2019 - 39th Annual International Cryptology Conference, Proceedings. Micciancio, D. & Boldyreva, A. (eds.). Springer Verlag, p. 401-431 31 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11694 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    93 Scopus citations
  • 2018

    SWiM: Secure Wildcard Pattern Matching from OT Extension

    Kolesnikov, V., Rosulek, M. & Trieu, N., 2018, Financial Cryptography and Data Security - 22nd International Conference, FC 2018, Revised Selected Papers. Meiklejohn, S. & Sako, K. (eds.). Springer Verlag, p. 222-240 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10957 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    7 Scopus citations
  • The curse of small domains: New attacks on format-preserving encryption

    Hoang, V. T., Tessaro, S. & Trieu, N., 2018, Advances in Cryptology – CRYPTO 2018 - 38th Annual International Cryptology Conference, 2018, Proceedings. Boldyreva, A. & Shacham, H. (eds.). Springer Verlag, p. 221-251 31 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10991 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    6 Scopus citations
  • 2017

    DUPLO: Unifying Cut-and-Choose for garbled circuits

    Kolesnikov, V., Nielsen, J. B., Rosulek, M., Trieu, N. & Trifiletti, R., Oct 30 2017, CCS 2017 - Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 3-20 18 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    22 Scopus citations
  • Practical multi-party private set intersection from symmetric-key techniques

    Kolesnikov, V., Matania, N., Pinkas, B., Rosulek, M. & Trieu, N., Oct 30 2017, CCS 2017 - Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 1257-1272 16 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    119 Scopus citations
  • 2016

    Efficient batched oblivious PRF with applications to private set intersection

    Kolesnikov, V., Kumaresan, R., Rosulek, M. & Trieu, N., Oct 24 2016, CCS 2016 - Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 818-829 12 p. (Proceedings of the ACM Conference on Computer and Communications Security; vol. 24-28-October-2016).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    203 Scopus citations
  • 2015

    Models and methods for the urban transit system research

    Sadovnikova, N., Parygin, D., Kalinkina, M., Sanzhapov, B. & Ni, T. N., 2015, Creativity in Intelligent Technologies and Data Science - 1st Conference, CIT and DS 2015, Proceedings. Kravets, A., Shcherbakov, M., Kultsova, M. & Shabalina, O. (eds.). Springer Verlag, p. 488-499 12 p. (Communications in Computer and Information Science; vol. 535).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    14 Scopus citations