default search action
Thomas Ristenpart
Person information
- affiliation: Cornell Tech, New York, NY, USA
- affiliation: University of Wisconsin-Madison, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j9]Emily Tseng, Rosanna Bellini, Yeuk-Yu Lee, Alana Ramjit, Thomas Ristenpart, Nicola Dell:
Data Stewardship in Clinical Computer Security: Balancing Benefit and Burden in Participatory Systems. Proc. ACM Hum. Comput. Interact. 8(CSCW1): 1-29 (2024) - [c104]Avital Shafran, Eran Malach, Thomas Ristenpart, Gil Segev, Stefano Tessaro:
Is ML-Based Cryptanalysis Inherently Limited? Simulating Cryptographic Adversaries via Gradient-Based Methods. CRYPTO (6) 2024: 37-71 - [c103]Rosanna Bellini, Emily Tseng, Noel Warford, Alaa Daffalla, Tara Matthews, Sunny Consolvo, Jill Palzkill Woelfer, Patrick Gage Kelley, Michelle L. Mazurek, Dana Cuomo, Nicola Dell, Thomas Ristenpart:
SoK: Safer Digital-Safety Research Involving At-Risk Users. SP 2024: 635-654 - [c102]Armin Namavari, Barry Wang, Sanketh Menda, Ben Nassi, Nirvan Tyagi, James Grimmelmann, Amy X. Zhang, Thomas Ristenpart:
Private Hierarchical Governance for Encrypted Messaging. SP 2024: 2610-2629 - [c101]Andrés Fábrega, Carolina Ortega Pérez, Armin Namavari, Ben Nassi, Rachit Agarwal, Thomas Ristenpart:
Injection Attacks Against End-to-End Encrypted Applications. SP 2024: 2648-2665 - [c100]Andrés Fábrega, Armin Namavari, Rachit Agarwal, Ben Nassi, Thomas Ristenpart:
Exploiting Leakage in Password Managers via Injection Attacks. USENIX Security Symposium 2024 - [c99]Lana Ramjit, Natalie Dolci, Francesca Rossi, Ryan Garcia, Thomas Ristenpart, Dana Cuomo:
Navigating Traumatic Stress Reactions During Computer Security Interventions. USENIX Security Symposium 2024 - [i61]Armin Namavari, Barry Wang, Sanketh Menda, Ben Nassi, Nirvan Tyagi, James Grimmelmann, Amy X. Zhang, Thomas Ristenpart:
Private Hierarchical Governance for Encrypted Messaging. CoRR abs/2406.19433 (2024) - [i60]Andrés Fábrega, Armin Namavari, Rachit Agarwal, Ben Nassi, Thomas Ristenpart:
Exploiting Leakage in Password Managers via Injection Attacks. CoRR abs/2408.07054 (2024) - [i59]Avital Shafran, Eran Malach, Thomas Ristenpart, Gil Segev, Stefano Tessaro:
Is ML-Based Cryptanalysis Inherently Limited? Simulating Cryptographic Adversaries via Gradient-Based Methods. IACR Cryptol. ePrint Arch. 2024: 1126 (2024) - 2023
- [c98]Sanketh Menda, Julia Len, Paul Grubbs, Thomas Ristenpart:
Context Discovery and Commitment Attacks - How to Break CCM, EAX, SIV, and More. EUROCRYPT (4) 2023: 379-407 - [c97]Rosanna Bellini, Kevin Lee, Megan A. Brown, Jeremy Shaffer, Rasika Bhalerao, Thomas Ristenpart:
The Digital-Safety Risks of Financial Technologies for Survivors of Intimate Partner Violence. USENIX Security Symposium 2023: 87-104 - [c96]Mazharul Islam, Marina Sanusi Bohuk, Paul Chung, Thomas Ristenpart, Rahul Chatterjee:
Araña: Discovering and Characterizing Password Guessing Attacks in Practice. USENIX Security Symposium 2023: 1019-1036 - [c95]Alaa Daffalla, Marina Sanusi Bohuk, Nicola Dell, Rosanna Bellini, Thomas Ristenpart:
Account Security Interfaces: Important, Unintuitive, and Untrustworthy. USENIX Security Symposium 2023: 3601-3618 - [i58]Rosanna Bellini, Emily Tseng, Noel Warford, Alaa Daffalla, Tara Matthews, Sunny Consolvo, Jill Palzkill Woelfer, Patrick Gage Kelley, Michelle L. Mazurek, Dana Cuomo, Nicola Dell, Thomas Ristenpart:
SoK: Safer Digital-Safety Research Involving At-Risk Users. CoRR abs/2309.00735 (2023) - [i57]Sanketh Menda, Julia Len, Paul Grubbs, Thomas Ristenpart:
Context Discovery and Commitment Attacks: How to Break CCM, EAX, SIV, and More. IACR Cryptol. ePrint Arch. 2023: 526 (2023) - 2022
- [j8]Yiqing Hua, Manoel Horta Ribeiro, Thomas Ristenpart, Robert West, Mor Naaman:
Characterizing Alternative Monetization Strategies on YouTube. Proc. ACM Hum. Comput. Interact. 6(CSCW2): 1-30 (2022) - [c94]Julia Len, Paul Grubbs, Thomas Ristenpart:
Authenticated Encryption with Key Identification. ASIACRYPT (3) 2022: 181-209 - [c93]Emily Tseng, Mehrnaz Sabet, Rosanna Bellini, Harkiran Kaur Sodhi, Thomas Ristenpart, Nicola Dell:
Care Infrastructures for Digital Security in Intimate Partner Violence. CHI 2022: 123:1-123:20 - [c92]Janet X. Chen, Allison McDonald, Yixin Zou, Emily Tseng, Kevin A. Roundy, Acar Tamersoy, Florian Schaub, Thomas Ristenpart, Nicola Dell:
Trauma-Informed Computing: Towards Safer Technology Experiences for All. CHI 2022: 544:1-544:20 - [c91]Nirvan Tyagi, Sofía Celi, Thomas Ristenpart, Nick Sullivan, Stefano Tessaro, Christopher A. Wood:
A Fast and Simple Partially Oblivious PRF, with Applications. EUROCRYPT (2) 2022: 674-705 - [c90]Yiqing Hua, Armin Namavari, Kaishuo Cheng, Mor Naaman, Thomas Ristenpart:
Increasing Adversarial Uncertainty to Scale Private Similarity Testing. USENIX Security Symposium 2022: 1777-1794 - [c89]Bijeeta Pal, Mazharul Islam, Marina Sanusi Bohuk, Nick Sullivan, Luke Valenta, Tara Whalen, Christopher A. Wood, Thomas Ristenpart, Rahul Chatterjee:
Might I Get Pwned: A Second Generation Compromised Credential Checking Service. USENIX Security Symposium 2022: 1831-1848 - [c88]Marina Sanusi Bohuk, Mazharul Islam, Suleman Ahmad, Michael M. Swift, Thomas Ristenpart, Rahul Chatterjee:
Gossamer: Securely Measuring Password-based Logins. USENIX Security Symposium 2022: 1867-1884 - [c87]Nirvan Tyagi, Julia Len, Ian Miers, Thomas Ristenpart:
Orca: Blocklisting in Sender-Anonymous Messaging. USENIX Security Symposium 2022: 2299-2316 - [i56]Yiqing Hua, Manoel Horta Ribeiro, Robert West, Thomas Ristenpart, Mor Naaman:
Characterizing Alternative Monetization Strategies on YouTube. CoRR abs/2203.10143 (2022) - [i55]Julia Len, Paul Grubbs, Thomas Ristenpart:
Authenticated Encryption with Key Identification. IACR Cryptol. ePrint Arch. 2022: 1680 (2022) - 2021
- [c86]Emily Tseng, Diana Freed, Kristen Engel, Thomas Ristenpart, Nicola Dell:
A Digital Safety Dilemma: Analysis of Computer-Mediated Computer Security Interventions for Intimate Partner Violence During COVID-19. CHI 2021: 71:1-71:17 - [c85]Kurt Thomas, Devdatta Akhawe, Michael D. Bailey, Dan Boneh, Elie Bursztein, Sunny Consolvo, Nicola Dell, Zakir Durumeric, Patrick Gage Kelley, Deepak Kumar, Damon McCoy, Sarah Meiklejohn, Thomas Ristenpart, Gianluca Stringhini:
SoK: Hate, Harassment, and the Changing Landscape of Online Abuse. SP 2021: 247-267 - [c84]Julia Len, Paul Grubbs, Thomas Ristenpart:
Partitioning Oracle Attacks. USENIX Security Symposium 2021: 195-212 - [c83]Yixin Zou, Allison McDonald, Julia Narakornpichit, Nicola Dell, Thomas Ristenpart, Kevin A. Roundy, Florian Schaub, Acar Tamersoy:
The Role of Computer Security Customer Support in Helping Survivors of Intimate Partner Violence. USENIX Security Symposium 2021: 429-446 - [c82]Min Xu, Armin Namavari, David Cash, Thomas Ristenpart:
Searching Encrypted Data with Size-Locked Indexes. USENIX Security Symposium 2021: 4025-4042 - [i54]Yiqing Hua, Armin Namavari, Kaishuo Cheng, Mor Naaman, Thomas Ristenpart:
Increasing Adversarial Uncertainty to Scale Private Similarity Testing. CoRR abs/2109.01727 (2021) - [i53]Bijeeta Pal, Mazharul Islam, Thomas Ristenpart, Rahul Chatterjee:
Might I Get Pwned: A Second Generation Password Breach Alerting Service. CoRR abs/2109.14490 (2021) - [i52]Nirvan Tyagi, Sofía Celi, Thomas Ristenpart, Nick Sullivan, Stefano Tessaro, Christopher A. Wood:
A Fast and Simple Partially Oblivious PRF, with Applications. IACR Cryptol. ePrint Arch. 2021: 864 (2021) - [i51]Nirvan Tyagi, Julia Len, Ian Miers, Thomas Ristenpart:
Orca: Blocklisting in Sender-Anonymous Messaging. IACR Cryptol. ePrint Arch. 2021: 1380 (2021) - 2020
- [j7]Rosanna Bellini, Emily Tseng, Nora McDonald, Rachel Greenstadt, Damon McCoy, Thomas Ristenpart, Nicola Dell:
"So-called privacy breeds evil": Narrative Justifications for Intimate Partner Surveillance in Online Forums. Proc. ACM Hum. Comput. Interact. 4(CSCW3): 1-27 (2020) - [c81]Yiqing Hua, Mor Naaman, Thomas Ristenpart:
Characterizing Twitter Users Who Engage in Adversarial Interactions against Political Candidates. CHI 2020: 1-13 - [c80]Yiqing Hua, Thomas Ristenpart, Mor Naaman:
Towards Measuring Adversarial Twitter Interactions against Candidates in the US Midterm Elections. ICWSM 2020: 272-282 - [c79]Kevin A. Roundy, Paula Barmaimon Mendelberg, Nicola Dell, Damon McCoy, Daniel Nissani, Thomas Ristenpart, Acar Tamersoy:
The Many Kinds of Creepware Used for Interpersonal Attacks. SP 2020: 626-643 - [c78]Emily Tseng, Rosanna Bellini, Nora McDonald, Matan Danos, Rachel Greenstadt, Damon McCoy, Nicola Dell, Thomas Ristenpart:
The Tools and Tactics Used in Intimate Partner Surveillance: An Analysis of Online Infidelity Forums. USENIX Security Symposium 2020: 1893-1909 - [c77]Paul Grubbs, Anurag Khandelwal, Marie-Sarah Lacharité, Lloyd Brown, Lucy Li, Rachit Agarwal, Thomas Ristenpart:
Pancake: Frequency Smoothing for Encrypted Data Stores. USENIX Security Symposium 2020: 2451-2468 - [e5]Daniele Micciancio, Thomas Ristenpart:
Advances in Cryptology - CRYPTO 2020 - 40th Annual International Cryptology Conference, CRYPTO 2020, Santa Barbara, CA, USA, August 17-21, 2020, Proceedings, Part I. Lecture Notes in Computer Science 12170, Springer 2020, ISBN 978-3-030-56783-5 [contents] - [e4]Daniele Micciancio, Thomas Ristenpart:
Advances in Cryptology - CRYPTO 2020 - 40th Annual International Cryptology Conference, CRYPTO 2020, Santa Barbara, CA, USA, August 17-21, 2020, Proceedings, Part II. Lecture Notes in Computer Science 12171, Springer 2020, ISBN 978-3-030-56879-5 [contents] - [e3]Daniele Micciancio, Thomas Ristenpart:
Advances in Cryptology - CRYPTO 2020 - 40th Annual International Cryptology Conference, CRYPTO 2020, Santa Barbara, CA, USA, August 17-21, 2020, Proceedings, Part III. Lecture Notes in Computer Science 12172, Springer 2020, ISBN 978-3-030-56876-4 [contents] - [i50]Yiqing Hua, Thomas Ristenpart, Mor Naaman:
Towards Measuring Adversarial Twitter Interactions against Candidates in the US Midterm Elections. CoRR abs/2005.04411 (2020) - [i49]Yiqing Hua, Mor Naaman, Thomas Ristenpart:
Characterizing Twitter Users Who Engage in Adversarial Interactions against Political Candidates. CoRR abs/2005.04412 (2020) - [i48]Emily Tseng, Rosanna Bellini, Nora McDonald, Matan Danos, Rachel Greenstadt, Damon McCoy, Nicola Dell, Thomas Ristenpart:
The Tools and Tactics Used in Intimate Partner Surveillance: An Analysis of Online Infidelity Forums. CoRR abs/2005.14341 (2020) - [i47]Deepak Sirone Jegan, Liang Wang, Siddhant Bhagat, Thomas Ristenpart, Michael M. Swift:
Guarding Serverless Applications with SecLambda. CoRR abs/2011.05322 (2020) - [i46]Julia Len, Paul Grubbs, Thomas Ristenpart:
Partitioning Oracle Attacks. IACR Cryptol. ePrint Arch. 2020: 1491 (2020) - [i45]Paul Grubbs, Anurag Khandelwal, Marie-Sarah Lacharité, Lloyd Brown, Lucy Li, Rachit Agarwal, Thomas Ristenpart:
PANCAKE: Frequency Smoothing for Encrypted Data Stores. IACR Cryptol. ePrint Arch. 2020: 1501 (2020)
2010 – 2019
- 2019
- [j6]Diana Freed, Sam Havron, Emily Tseng, Andrea Gallardo, Rahul Chatterjee, Thomas Ristenpart, Nicola Dell:
"Is my phone hacked?" Analyzing Clinical Computer Security Interventions with Survivors of Intimate Partner Violence. Proc. ACM Hum. Comput. Interact. 3(CSCW): 202:1-202:24 (2019) - [c76]Nirvan Tyagi, Ian Miers, Thomas Ristenpart:
Traceback for End-to-End Encrypted Messaging. CCS 2019: 413-430 - [c75]Lucy Li, Bijeeta Pal, Junade Ali, Nick Sullivan, Rahul Chatterjee, Thomas Ristenpart:
Protocols for Checking Compromised Credentials. CCS 2019: 1387-1403 - [c74]Nirvan Tyagi, Paul Grubbs, Julia Len, Ian Miers, Thomas Ristenpart:
Asymmetric Message Franking: Content Moderation for Metadata-Private End-to-End Encryption. CRYPTO (3) 2019: 222-250 - [c73]Bijeeta Pal, Tal Daniel, Rahul Chatterjee, Thomas Ristenpart:
Beyond Credential Stuffing: Password Similarity Models Using Neural Networks. IEEE Symposium on Security and Privacy 2019: 417-434 - [c72]Liang Wang, Gilad Asharov, Rafael Pass, Thomas Ristenpart, Abhi Shelat:
Blind Certificate Authorities. IEEE Symposium on Security and Privacy 2019: 1015-1032 - [c71]Sam Havron, Diana Freed, Rahul Chatterjee, Damon McCoy, Nicola Dell, Thomas Ristenpart:
Clinical Computer Security for Victims of Intimate Partner Violence. USENIX Security Symposium 2019: 105-122 - [i44]Lucy Li, Bijeeta Pal, Junade Ali, Nick Sullivan, Rahul Chatterjee, Thomas Ristenpart:
Protocols for Checking Compromised Credentials. CoRR abs/1905.13737 (2019) - [i43]Yevgeniy Dodis, Paul Grubbs, Thomas Ristenpart, Joanne Woodage:
Fast Message Franking: From Invisible Salamanders to Encryptment. IACR Cryptol. ePrint Arch. 2019: 16 (2019) - [i42]Nirvan Tyagi, Paul Grubbs, Julia Len, Ian Miers, Thomas Ristenpart:
Asymmetric Message Franking: Content Moderation for Metadata-Private End-to-End Encryption. IACR Cryptol. ePrint Arch. 2019: 565 (2019) - [i41]Nirvan Tyagi, Ian Miers, Thomas Ristenpart:
Traceback for End-to-End Encrypted Messaging. IACR Cryptol. ePrint Arch. 2019: 981 (2019) - 2018
- [j5]Vincent Bindschaedler, Paul Grubbs, David Cash, Thomas Ristenpart, Vitaly Shmatikov:
The Tao of Inference in Privacy-Protected Databases. Proc. VLDB Endow. 11(11): 1715-1728 (2018) - [c70]Diana Freed, Jackeline Palmer, Diana Elizabeth Minchala, Karen Levy, Thomas Ristenpart, Nicola Dell:
"A Stalker's Paradise": How Intimate Partner Abusers Exploit Technology. CHI 2018: 667 - [c69]Yevgeniy Dodis, Paul Grubbs, Thomas Ristenpart, Joanne Woodage:
Fast Message Franking: From Invisible Salamanders to Encryptment. CRYPTO (1) 2018: 155-186 - [c68]Rahul Chatterjee, Periwinkle Doerfler, Hadas Orgad, Sam Havron, Jackeline Palmer, Diana Freed, Karen Levy, Nicola Dell, Damon McCoy, Thomas Ristenpart:
The Spyware Used in Intimate Partner Violence. IEEE Symposium on Security and Privacy 2018: 441-458 - [c67]Liang Wang, Mengyuan Li, Yinqian Zhang, Thomas Ristenpart, Michael M. Swift:
Peeking Behind the Curtains of Serverless Platforms. USENIX ATC 2018: 133-146 - [c66]Nirvan Tyagi, Muhammad Haris Mughees, Thomas Ristenpart, Ian Miers:
BurnBox: Self-Revocable Encryption in a World Of Compelled Access. USENIX Security Symposium 2018: 445-461 - [i40]Jeffrey Knockel, Thomas Ristenpart, Jedidiah R. Crandall:
When Textbook RSA is Used to Protect the Privacy of Hundreds of Millions of Users. CoRR abs/1802.03367 (2018) - [i39]Nirvan Tyagi, Muhammad Haris Mughees, Thomas Ristenpart, Ian Miers:
BurnBox: Self-Revocable Encryption in a World Of Compelled Access. IACR Cryptol. ePrint Arch. 2018: 638 (2018) - [i38]Liang Wang, Gilad Asharov, Rafael Pass, Thomas Ristenpart, Abhi Shelat:
Blind Certificate Authorities. IACR Cryptol. ePrint Arch. 2018: 1022 (2018) - 2017
- [j4]Jay Aikat, Aditya Akella, Jeffrey S. Chase, Ari Juels, Michael K. Reiter, Thomas Ristenpart, Vyas Sekar, Michael M. Swift:
Rethinking Security in the Era of Cloud Computing. IEEE Secur. Priv. 15(3): 60-69 (2017) - [j3]Diana Freed, Jackeline Palmer, Diana Elizabeth Minchala, Karen Levy, Thomas Ristenpart, Nicola Dell:
Digital Technologies and Intimate Partner Violence: A Qualitative Analysis with Multiple Stakeholders. Proc. ACM Hum. Comput. Interact. 1(CSCW): 46:1-46:22 (2017) - [c65]Rahul Chatterjee, Joanne Woodage, Yuval Pnueli, Anusha Chowdhury, Thomas Ristenpart:
The TypTop System: Personalized Typo-Tolerant Password Checking. CCS 2017: 329-346 - [c64]Congzheng Song, Thomas Ristenpart, Vitaly Shmatikov:
Machine Learning Models that Remember Too Much. CCS 2017: 587-601 - [c63]Ivan Pustogarov, Thomas Ristenpart, Vitaly Shmatikov:
Using Program Analysis to Synthesize Sensor Spoofing Attacks. AsiaCCS 2017: 757-770 - [c62]Paul Grubbs, Jiahui Lu, Thomas Ristenpart:
Message Franking via Committing Authenticated Encryption. CRYPTO (3) 2017: 66-97 - [c61]Adam Everspaugh, Kenneth G. Paterson, Thomas Ristenpart, Samuel Scott:
Key Rotation for Authenticated Encryption. CRYPTO (3) 2017: 98-129 - [c60]Joanne Woodage, Rahul Chatterjee, Yevgeniy Dodis, Ari Juels, Thomas Ristenpart:
A New Distribution-Sensitive Secure Sketch and Popularity-Proportional Hashing. CRYPTO (3) 2017: 682-710 - [c59]Paul Grubbs, Thomas Ristenpart, Yuval Yarom:
Modifying an Enciphering Scheme After Deployment. EUROCRYPT (2) 2017: 499-527 - [c58]Paul Grubbs, Thomas Ristenpart, Vitaly Shmatikov:
Why Your Encrypted Database Is Not Secure. HotOS 2017: 162-168 - [c57]Paul Grubbs, Kevin Sekniqi, Vincent Bindschaedler, Muhammad Naveed, Thomas Ristenpart:
Leakage-Abuse Attacks against Order-Revealing Encryption. IEEE Symposium on Security and Privacy 2017: 655-672 - [c56]Liang Wang, Paul Grubbs, Jiahui Lu, Vincent Bindschaedler, David Cash, Thomas Ristenpart:
Side-Channel Attacks on Shared Search Indexes. IEEE Symposium on Security and Privacy 2017: 673-692 - [e2]Engin Kirda, Thomas Ristenpart:
26th USENIX Security Symposium, USENIX Security 2017, Vancouver, BC, Canada, August 16-18, 2017. USENIX Association 2017 [contents] - [i37]Congzheng Song, Thomas Ristenpart, Vitaly Shmatikov:
Machine Learning Models that Remember Too Much. CoRR abs/1709.07886 (2017) - [i36]Paul Grubbs, Thomas Ristenpart, Yuval Yarom:
Modifying an Enciphering Scheme after Deployment. IACR Cryptol. ePrint Arch. 2017: 137 (2017) - [i35]Paul Grubbs, Thomas Ristenpart, Vitaly Shmatikov:
Why Your Encrypted Database Is Not Secure. IACR Cryptol. ePrint Arch. 2017: 468 (2017) - [i34]Adam Everspaugh, Kenneth G. Paterson, Thomas Ristenpart, Samuel Scott:
Key Rotation for Authenticated Encryption. IACR Cryptol. ePrint Arch. 2017: 527 (2017) - [i33]Joanne Woodage, Rahul Chatterjee, Yevgeniy Dodis, Ari Juels, Thomas Ristenpart:
A New Distribution Sensitive Secure Sketch and a Comparison Between Approaches to Typo-Tolerant Authentication. IACR Cryptol. ePrint Arch. 2017: 542 (2017) - [i32]Paul Grubbs, Jiahui Lu, Thomas Ristenpart:
Message Franking via Committing Authenticated Encryption. IACR Cryptol. ePrint Arch. 2017: 664 (2017) - [i31]Rahul Chatterjee, Joanne Woodage, Yuval Pnueli, Anusha Chowdhury, Thomas Ristenpart:
The TypTop System: Personalized Typo-Tolerant Password Checking. IACR Cryptol. ePrint Arch. 2017: 810 (2017) - [i30]Vincent Bindschaedler, Paul Grubbs, David Cash, Thomas Ristenpart, Vitaly Shmatikov:
The Tao of Inference in Privacy-Protected Databases. IACR Cryptol. ePrint Arch. 2017: 1078 (2017) - 2016
- [j2]Lucas Dixon, Thomas Ristenpart, Thomas Shrimpton:
Network Traffic Obfuscation and Automated Internet Censorship. IEEE Secur. Priv. 14(6): 43-53 (2016) - [c55]Paul Grubbs, Richard McPherson, Muhammad Naveed, Thomas Ristenpart, Vitaly Shmatikov:
Breaking Web Applications Built On Top of Encrypted Data. CCS 2016: 1353-1364 - [c54]Yan Zhai, Lichao Yin, Jeffrey S. Chase, Thomas Ristenpart, Michael M. Swift:
CQSTR: Securing Cross-Tenant Applications with Cloud Containers. SoCC 2016: 223-236 - [c53]Joseph Jaeger, Thomas Ristenpart, Qiang Tang:
Honey Encryption Beyond Message Recovery Security. EUROCRYPT (1) 2016: 758-788 - [c52]Rahul Chatterjee, Anish Athayle, Devdatta Akhawe, Ari Juels, Thomas Ristenpart:
pASSWORD tYPOS and How to Correct Them Securely. IEEE Symposium on Security and Privacy 2016: 799-818 - [c51]Florian Tramèr, Fan Zhang, Ari Juels, Michael K. Reiter, Thomas Ristenpart:
Stealing Machine Learning Models via Prediction APIs. USENIX Security Symposium 2016: 601-618 - [c50]Drew Davidson, Hao Wu, Robert Jellinek, Vikas Singh, Thomas Ristenpart:
Controlling UAVs with Sensor Input Spoofing Attacks. WOOT 2016 - [i29]Lucas Dixon, Thomas Ristenpart, Thomas Shrimpton:
Network Traffic Obfuscation and Automated Internet Censorship. CoRR abs/1605.04044 (2016) - [i28]Florian Tramèr, Fan Zhang, Ari Juels, Michael K. Reiter, Thomas Ristenpart:
Stealing Machine Learning Models via Prediction APIs. CoRR abs/1609.02943 (2016) - [i27]Joseph Jaeger, Thomas Ristenpart, Qiang Tang:
Honey Encryption Beyond Message Recovery Security. IACR Cryptol. ePrint Arch. 2016: 174 (2016) - [i26]Yevgeniy Dodis, Chaya Ganesh, Alexander Golovnev, Ari Juels, Thomas Ristenpart:
A Formal Treatment of Backdoored Pseudorandom Generators. IACR Cryptol. ePrint Arch. 2016: 306 (2016) - [i25]David Cash, Paul Grubbs, Jason Perry, Thomas Ristenpart:
Leakage-Abuse Attacks Against Searchable Encryption. IACR Cryptol. ePrint Arch. 2016: 718 (2016) - [i24]Paul Grubbs, Kevin Sekniqi, Vincent Bindschaedler, Muhammad Naveed, Thomas Ristenpart:
Leakage-Abuse Attacks against Order-Revealing Encryption. IACR Cryptol. ePrint Arch. 2016: 895 (2016) - [i23]Paul Grubbs, Richard McPherson, Muhammad Naveed, Thomas Ristenpart, Vitaly Shmatikov:
Breaking Web Applications Built On Top of Encrypted Data. IACR Cryptol. ePrint Arch. 2016: 920 (2016) - [i22]Liang Wang, Rafael Pass, Abhi Shelat, Thomas Ristenpart:
Secure Channel Injection and Anonymous Proofs of Account Ownership. IACR Cryptol. ePrint Arch. 2016: 925 (2016) - 2015
- [c49]Liang Wang, Kevin P. Dyer, Aditya Akella, Thomas Ristenpart, Thomas Shrimpton:
Seeing through Network-Protocol Obfuscation. CCS 2015: 57-69 - [c48]David Cash, Paul Grubbs, Jason Perry, Thomas Ristenpart:
Leakage-Abuse Attacks Against Searchable Encryption. CCS 2015: 668-679 - [c47]Matt Fredrikson, Somesh Jha, Thomas Ristenpart:
Model Inversion Attacks that Exploit Confidence Information and Basic Countermeasures. CCS 2015: 1322-1333 - [c46]Yevgeniy Dodis, Chaya Ganesh, Alexander Golovnev, Ari Juels, Thomas Ristenpart:
A Formal Treatment of Backdoored Pseudorandom Generators. EUROCRYPT (1) 2015: 101-126 - [c45]Rahul Chatterjee, Joseph Bonneau, Ari Juels, Thomas Ristenpart:
Cracking-Resistant Password Vaults Using Natural Language Encoders. IEEE Symposium on Security and Privacy 2015: 481-498 - [c44]Adam Everspaugh, Rahul Chatterjee, Samuel Scott, Ari Juels, Thomas Ristenpart:
The Pythia PRF Service. USENIX Security Symposium 2015: 547-562 - [c43]Venkatanathan Varadarajan, Yinqian Zhang, Thomas Ristenpart, Michael M. Swift:
A Placement Vulnerability Study in Multi-Tenant Public Clouds. USENIX Security Symposium 2015: 913-928 - [i21]Venkatanathan Varadarajan, Yinqian Zhang, Thomas Ristenpart, Michael M. Swift:
A Placement Vulnerability Study in Multi-tenant Public Clouds. CoRR abs/1507.03114 (2015) - [i20]Bruce Schneier, Matthew Fredrikson, Tadayoshi Kohno, Thomas Ristenpart:
Surreptitiously Weakening Cryptographic Systems. IACR Cryptol. ePrint Arch. 2015: 97 (2015) - [i19]Adam Everspaugh, Rahul Chatterjee, Samuel Scott, Ari Juels, Thomas Ristenpart:
The Pythia PRF Service. IACR Cryptol. ePrint Arch. 2015: 644 (2015) - [i18]Rahul Chatterjee, Joseph Bonneau, Ari Juels, Thomas Ristenpart:
Cracking-Resistant Password Vaults using Natural Language Encoders. IACR Cryptol. ePrint Arch. 2015: 788 (2015) - 2014
- [j1]Ari Juels, Thomas Ristenpart:
Honey Encryption: Encryption beyond the Brute-Force Barrier. IEEE Secur. Priv. 12(4): 59-62 (2014) - [c42]Yinqian Zhang, Ari Juels, Michael K. Reiter, Thomas Ristenpart:
Cross-Tenant Side-Channel Attacks in PaaS Clouds. CCS 2014: 990-1003 - [c41]Daniel Luchaup, Thomas Shrimpton, Thomas Ristenpart, Somesh Jha:
Formatted Encryption Beyond Regular Languages. CCS 2014: 1292-1303 - [c40]Ari Juels, Thomas Ristenpart:
Honey Encryption: Security Beyond the Brute-Force Bound. EUROCRYPT 2014: 293-310 - [c39]Robert Jellinek, Yan Zhai, Thomas Ristenpart, Michael M. Swift:
A Day Late and a Dollar Short: The Case for Research on Cloud Billing Systems. HotCloud 2014 - [c38]Liang Wang, Antonio Nappa, Juan Caballero, Thomas Ristenpart, Aditya Akella:
WhoWas: A Platform for Measuring Web Deployments on IaaS Clouds. Internet Measurement Conference 2014: 101-114 - [c37]Adam Everspaugh, Yan Zhai, Robert Jellinek, Thomas Ristenpart, Michael M. Swift:
Not-So-Random Numbers in Virtualized Linux and the Whirlwind RNG. IEEE Symposium on Security and Privacy 2014: 559-574 - [c36]Matthew Fredrikson, Eric Lantz, Somesh Jha, Simon M. Lin, David Page, Thomas Ristenpart:
Privacy in Pharmacogenetics: An End-to-End Case Study of Personalized Warfarin Dosing. USENIX Security Symposium 2014: 17-32 - [c35]Stephen Checkoway, Ruben Niederhagen, Adam Everspaugh, Matthew Green, Tanja Lange, Thomas Ristenpart, Daniel J. Bernstein, Jake Maskiewicz, Hovav Shacham, Matthew Fredrikson:
On the Practical Exploitability of Dual EC in TLS Implementations. USENIX Security Symposium 2014: 319-335 - [c34]Venkatanathan Varadarajan, Thomas Ristenpart, Michael M. Swift:
Scheduler-based Defenses against Cross-VM Side-channels. USENIX Security Symposium 2014: 687-702 - [c33]Daniel Luchaup, Kevin P. Dyer, Somesh Jha, Thomas Ristenpart, Thomas Shrimpton:
LibFTE: A Toolkit for Constructing Practical, Format-Abiding Encryption Schemes. USENIX Security Symposium 2014: 877-891 - [i17]Ari Juels, Thomas Ristenpart:
Honey Encryption: Security Beyond the Brute-Force Bound. IACR Cryptol. ePrint Arch. 2014: 155 (2014) - 2013
- [c32]Kevin P. Dyer, Scott E. Coull, Thomas Ristenpart, Thomas Shrimpton:
Protocol misidentification made easy with format-transforming encryption. CCS 2013: 61-72 - [c31]Thomas Ristenpart, Scott Yilek:
The Mix-and-Cut Shuffle: Small-Domain Encryption Secure against N Queries. CRYPTO (1) 2013: 392-409 - [c30]Mihir Bellare, Sriram Keelveedhi, Thomas Ristenpart:
Message-Locked Encryption and Secure Deduplication. EUROCRYPT 2013: 296-312 - [c29]Keqiang He, Alexis Fisher, Liang Wang, Aaron Gember, Aditya Akella, Thomas Ristenpart:
Next stop, the cloud: understanding modern web service deployment in EC2 and azure. Internet Measurement Conference 2013: 177-190 - [c28]Sriram Keelveedhi, Mihir Bellare, Thomas Ristenpart:
DupLESS: Server-Aided Encryption for Deduplicated Storage. USENIX Security Symposium 2013: 179-194 - [c27]Drew Davidson, Benjamin Moench, Thomas Ristenpart, Somesh Jha:
FIE on Firmware: Finding Vulnerabilities in Embedded Systems Using Symbolic Execution. USENIX Security Symposium 2013: 463-478 - [i16]Yevgeniy Dodis, Thomas Ristenpart, John P. Steinberger, Stefano Tessaro:
To Hash or Not to Hash Again? (In)differentiability Results for H2 and HMAC. IACR Cryptol. ePrint Arch. 2013: 382 (2013) - [i15]Mihir Bellare, Sriram Keelveedhi, Thomas Ristenpart:
DupLESS: Server-Aided Encryption for Deduplicated Storage. IACR Cryptol. ePrint Arch. 2013: 429 (2013) - 2012
- [c26]Venkatanathan Varadarajan, Thawan Kooburat, Benjamin Farley, Thomas Ristenpart, Michael M. Swift:
Resource-freeing attacks: improve your cloud performance (at your neighbor's expense). CCS 2012: 281-292 - [c25]Yinqian Zhang, Ari Juels, Michael K. Reiter, Thomas Ristenpart:
Cross-VM side channels and their use to extract private keys. CCS 2012: 305-316 - [c24]Benjamin Farley, Ari Juels, Venkatanathan Varadarajan, Thomas Ristenpart, Kevin D. Bowers, Michael M. Swift:
More for your money: exploiting performance heterogeneity in public clouds. SoCC 2012: 20 - [c23]Mihir Bellare, Thomas Ristenpart, Stefano Tessaro:
Multi-instance Security and Its Application to Password-Based Cryptography. CRYPTO 2012: 312-329 - [c22]Yevgeniy Dodis, Thomas Ristenpart, John P. Steinberger, Stefano Tessaro:
To Hash or Not to Hash Again? (In)Differentiability Results for H 2 and HMAC. CRYPTO 2012: 348-366 - [c21]Kevin P. Dyer, Scott E. Coull, Thomas Ristenpart, Thomas Shrimpton:
Peek-a-Boo, I Still See You: Why Efficient Traffic Analysis Countermeasures Fail. IEEE Symposium on Security and Privacy 2012: 332-346 - [c20]Yevgeniy Dodis, Thomas Ristenpart, Salil P. Vadhan:
Randomness Condensers for Efficiently Samplable, Seed-Dependent Sources. TCC 2012: 618-635 - [c19]WesLee Frisby, Benjamin Moench, Benjamin Recht, Thomas Ristenpart:
Security Analysis of Smartphone Point-of-Sale Systems. WOOT 2012: 22-33 - [i14]Mihir Bellare, Stefano Tessaro, Thomas Ristenpart:
Multi-Instance Security and its Application to Password-Based Cryptography. IACR Cryptol. ePrint Arch. 2012: 196 (2012) - [i13]Mihir Bellare, Zvika Brakerski, Moni Naor, Thomas Ristenpart, Gil Segev, Hovav Shacham, Scott Yilek:
Hedged Public-key Encryption: How to Protect against Bad Randomness. IACR Cryptol. ePrint Arch. 2012: 220 (2012) - [i12]Kevin P. Dyer, Scott E. Coull, Thomas Ristenpart, Thomas Shrimpton:
Format-Transforming Encryption: More than Meets the DPI. IACR Cryptol. ePrint Arch. 2012: 494 (2012) - [i11]Mihir Bellare, Sriram Keelveedhi, Thomas Ristenpart:
Message-Locked Encryption and Secure Deduplication. IACR Cryptol. ePrint Arch. 2012: 631 (2012) - 2011
- [c18]Kenneth G. Paterson, Thomas Ristenpart, Thomas Shrimpton:
Tag Size Does Matter: Attacks and Proofs for the TLS Record Protocol. ASIACRYPT 2011: 372-389 - [c17]Thomas Ristenpart, Hovav Shacham, Thomas Shrimpton:
Careful with Composition: Limitations of the Indifferentiability Framework. EUROCRYPT 2011: 487-506 - [c16]Qing Zhang, Thomas Ristenpart, Stefan Savage, Geoffrey M. Voelker:
Got traffic?: an evaluation of click traffic providers. WebQuality@WWW 2011: 19-26 - [e1]Christian Cachin, Thomas Ristenpart:
Proceedings of the 3rd ACM Cloud Computing Security Workshop, CCSW 2011, Chicago, IL, USA, October 21, 2011. ACM 2011, ISBN 978-1-4503-1004-8 [contents] - [i10]Thomas Ristenpart, Hovav Shacham, Thomas Shrimpton:
Careful with Composition: Limitations of Indifferentiability and Universal Composability. IACR Cryptol. ePrint Arch. 2011: 339 (2011) - 2010
- [b1]Thomas Ristenpart:
New approaches for the design and analysis of cryptographic hash functions. University of California, San Diego, USA, 2010 - [c15]Marc Fischlin, Anja Lehmann, Thomas Ristenpart, Thomas Shrimpton, Martijn Stam, Stefano Tessaro:
Random Oracles with(out) Programmability. ASIACRYPT 2010: 303-320 - [c14]Thomas Ristenpart, Scott Yilek:
When Good Randomness Goes Bad: Virtual Machine Reset Vulnerabilities and Hedging Deployed Cryptography. NDSS 2010
2000 – 2009
- 2009
- [c13]Mihir Bellare, Zvika Brakerski, Moni Naor, Thomas Ristenpart, Gil Segev, Hovav Shacham, Scott Yilek:
Hedged Public-Key Encryption: How to Protect against Bad Randomness. ASIACRYPT 2009: 232-249 - [c12]Thomas Ristenpart, Eran Tromer, Hovav Shacham, Stefan Savage:
Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds. CCS 2009: 199-212 - [c11]Yevgeniy Dodis, Thomas Ristenpart, Thomas Shrimpton:
Salvaging Merkle-Damgård for Practical Applications. EUROCRYPT 2009: 371-388 - [c10]Mihir Bellare, Thomas Ristenpart:
Simulation without the Artificial Abort: Simplified Proof and Improved Concrete Security for Waters' IBE Scheme. EUROCRYPT 2009: 407-424 - [c9]Mihir Bellare, Thomas Ristenpart, Phillip Rogaway, Till Stegers:
Format-Preserving Encryption. Selected Areas in Cryptography 2009: 295-312 - [i9]Mihir Bellare, Thomas Ristenpart:
Simulation without the Artificial Abort: Simplified Proof and Improved Concrete Security for Waters' IBE Scheme. IACR Cryptol. ePrint Arch. 2009: 84 (2009) - [i8]Yevgeniy Dodis, Thomas Ristenpart, Thomas Shrimpton:
Salvaging Merkle-Damgard for Practical Applications. IACR Cryptol. ePrint Arch. 2009: 177 (2009) - [i7]Mihir Bellare, Thomas Ristenpart, Phillip Rogaway, Till Stegers:
Format-Preserving Encryption. IACR Cryptol. ePrint Arch. 2009: 251 (2009) - 2008
- [c8]Mihir Bellare, Marc Fischlin, Adam O'Neill, Thomas Ristenpart:
Deterministic Encryption: Definitional Equivalences and Constructions without Random Oracles. CRYPTO 2008: 360-378 - [c7]Thomas Ristenpart, Gabriel Maganis, Arvind Krishnamurthy, Tadayoshi Kohno:
Privacy-Preserving Location Tracking of Lost or Stolen Devices: Cryptographic Techniques and Replacing Trusted Third Parties with DHTs. USENIX Security Symposium 2008: 275-290 - [i6]Thomas Ristenpart, Thomas Shrimpton:
How to Build a Hash Function from any Collision-Resistant Function. IACR Cryptol. ePrint Arch. 2008: 189 (2008) - [i5]Mihir Bellare, Marc Fischlin, Adam O'Neill, Thomas Ristenpart:
Deterministic Encryption: Definitional Equivalences and Constructions without Random Oracles. IACR Cryptol. ePrint Arch. 2008: 267 (2008) - 2007
- [c6]Thomas Ristenpart, Thomas Shrimpton:
How to Build a Hash Function from Any Collision-Resistant Function. ASIACRYPT 2007: 147-163 - [c5]Thomas Ristenpart, Scott Yilek:
The Power of Proofs-of-Possession: Securing Multiparty Signatures against Rogue-Key Attacks. EUROCRYPT 2007: 228-245 - [c4]Thomas Ristenpart, Phillip Rogaway:
How to Enrich the Message Space of a Cipher. FSE 2007: 101-118 - [c3]Mihir Bellare, Thomas Ristenpart:
Hash Functions in the Dedicated-Key Setting: Design Choices and MPP Transforms. ICALP 2007: 399-410 - [i4]Thomas Ristenpart, Phillip Rogaway:
How to Enrich the Message Space of a Cipher. IACR Cryptol. ePrint Arch. 2007: 109 (2007) - [i3]Thomas Ristenpart, Scott Yilek:
The Power of Proofs-of-Possession: Securing Multiparty Signatures against Rogue-Key Attacks. IACR Cryptol. ePrint Arch. 2007: 264 (2007) - [i2]Mihir Bellare, Thomas Ristenpart:
Hash Functions in the Dedicated-Key Setting: Design Choices and MPP Transforms. IACR Cryptol. ePrint Arch. 2007: 271 (2007) - 2006
- [c2]Francis Hsu, Hao Chen, Thomas Ristenpart, Jason Li, Zhendong Su:
Back to the Future: A Framework for Automatic Malware Removal and System Repair. ACSAC 2006: 257-268 - [c1]Mihir Bellare, Thomas Ristenpart:
Multi-Property-Preserving Hash Domain Extension and the EMD Transform. ASIACRYPT 2006: 299-314 - [i1]Mihir Bellare, Thomas Ristenpart:
Multi-Property-Preserving Hash Domain Extension and the EMD Transform. IACR Cryptol. ePrint Arch. 2006: 399 (2006)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:21 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint