<?xml version="1.0"?>
<dblpperson name="Thomas Ristenpart" pid="26/3399" n="204">
<person key="homepages/26/3399" mdate="2020-09-05">
<author pid="26/3399">Thomas Ristenpart</author>
<note type="affiliation">Cornell Tech, New York, NY, USA</note>
<note type="affiliation">University of Wisconsin-Madison, USA</note>
<url>http://rist.tech.cornell.edu/</url>
<url>https://orcid.org/0000-0002-8642-9558</url>
</person>
<r><article publtype="informal" key="journals/iacr/MendaBHLR26" mdate="2026-03-21">
<author pid="213/7956">Sanketh Menda</author>
<author pid="b/MBellare">Mihir Bellare</author>
<author pid="12/1662">Viet Tung Hoang</author>
<author pid="207/6590">Julia Len</author>
<author pid="26/3399">Thomas Ristenpart</author>
<title>The OCH Authenticated Encryption Scheme.</title>
<year>2026</year>
<pages>439</pages>
<volume>2026</volume>
<journal>IACR Cryptol. ePrint Arch.</journal>
<ee type="oa">https://eprint.iacr.org/2026/439</ee>
<url>db/journals/iacr/iacr2026.html#MendaBHLR26</url>
<stream>streams/journals/iacr</stream>
</article>
</r>
<r><article publtype="informal" key="journals/iacr/GerhartPR26" mdate="2026-03-21">
<author pid="350/5886">Paul Gerhart</author>
<author pid="385/6919">Carolina Ortega P&#233;rez</author>
<author pid="26/3399">Thomas Ristenpart</author>
<title>Trace: Complete Client-Side Account Access Logging.</title>
<year>2026</year>
<pages>447</pages>
<volume>2026</volume>
<journal>IACR Cryptol. ePrint Arch.</journal>
<ee type="oa">https://eprint.iacr.org/2026/447</ee>
<url>db/journals/iacr/iacr2026.html#GerhartPR26</url>
<stream>streams/journals/iacr</stream>
</article>
</r>
<r><article publtype="informal" key="journals/iacr/KumarPJRS26" mdate="2026-03-21">
<author pid="339/2029">Akshaya Kumar</author>
<author pid="385/6919">Carolina Ortega P&#233;rez</author>
<author pid="153/9914">Joseph Jaeger</author>
<author pid="26/3399">Thomas Ristenpart</author>
<author pid="169/8186">Michael A. Specter</author>
<title>SoK: Offline Finding Protocols for Lightweight Location Tracking.</title>
<year>2026</year>
<pages>488</pages>
<volume>2026</volume>
<journal>IACR Cryptol. ePrint Arch.</journal>
<ee type="oa">https://eprint.iacr.org/2026/488</ee>
<url>db/journals/iacr/iacr2026.html#KumarPJRS26</url>
<stream>streams/journals/iacr</stream>
</article>
</r>
<r><article key="journals/pacmhci/TsengRD25" mdate="2025-08-09">
<author orcid="0000-0003-1087-1101" pid="245/6107">Emily Tseng</author>
<author orcid="0000-0002-8642-9558" pid="26/3399">Thomas Ristenpart</author>
<author orcid="0000-0002-6119-705X" pid="75/11301">Nicola Dell</author>
<title>Mitigating Trauma in Qualitative Research Infrastructure: Roles for Machine Assistance and Trauma-Informed Design.</title>
<pages>1-37</pages>
<year>2025</year>
<volume>9</volume>
<journal>Proc. ACM Hum. Comput. Interact.</journal>
<number>2</number>
<ee>https://doi.org/10.1145/3711035</ee>
<url>db/journals/pacmhci/pacmhci9.html#TsengRD25</url>
<stream>streams/journals/pacmhci</stream>
</article>
</r>
<r><inproceedings key="conf/asiacrypt/NamavariR25" mdate="2026-01-08">
<author pid="301/5856">Armin Namavari</author>
<author pid="26/3399">Thomas Ristenpart</author>
<title>Transcript Franking for Encrypted Messaging.</title>
<pages>3-33</pages>
<year>2025</year>
<booktitle>ASIACRYPT (2)</booktitle>
<ee>https://doi.org/10.1007/978-981-95-5096-8_1</ee>
<crossref>conf/asiacrypt/2025-2</crossref>
<url>db/conf/asiacrypt/asiacrypt2025-2.html#NamavariR25</url>
<stream>streams/conf/asiacrypt</stream>
</inproceedings>
</r>
<r><inproceedings key="conf/ccs/MendaBHLR25" mdate="2025-12-26">
<author orcid="0000-0003-2216-2425" pid="213/7956">Sanketh Menda</author>
<author orcid="0000-0002-8765-5573" pid="b/MBellare">Mihir Bellare</author>
<author orcid="0000-0003-3092-6405" pid="12/1662">Viet Tung Hoang</author>
<author orcid="0000-0002-9625-6363" pid="207/6590">Julia Len</author>
<author orcid="0000-0002-8642-9558" pid="26/3399">Thomas Ristenpart</author>
<title>The OCH Authenticated Encryption Scheme.</title>
<pages>2234-2248</pages>
<year>2025</year>
<booktitle>CCS</booktitle>
<ee>https://doi.org/10.1145/3719027.3765224</ee>
<crossref>conf/ccs/2025</crossref>
<url>db/conf/ccs/ccs2025.html#MendaBHLR25</url>
</inproceedings>
</r>
<r><inproceedings key="conf/ccs/PerezRL25" mdate="2025-12-26">
<author orcid="0000-0002-1433-3020" pid="385/6919">Carolina Ortega P&#233;rez</author>
<author orcid="0000-0002-8642-9558" pid="26/3399">Thomas Ristenpart</author>
<author orcid="0000-0002-9625-6363" pid="207/6590">Julia Len</author>
<title>Interoperable Symmetric Message Franking.</title>
<pages>2264-2278</pages>
<year>2025</year>
<booktitle>CCS</booktitle>
<ee>https://doi.org/10.1145/3719027.3744864</ee>
<crossref>conf/ccs/2025</crossref>
<url>db/conf/ccs/ccs2025.html#PerezRL25</url>
</inproceedings>
</r>
<r><inproceedings key="conf/chi/StephensonRRD25" mdate="2025-05-09">
<author orcid="0009-0008-8051-0436" pid="325/3688">Sophie Stephenson</author>
<author orcid="0009-0004-9547-6681" pid="252/6200">Lana Ramjit</author>
<author orcid="0000-0002-8642-9558" pid="26/3399">Thomas Ristenpart</author>
<author orcid="0000-0002-6119-705X" pid="75/11301">Nicola Dell</author>
<title>Digital Technologies and Human Trafficking: Combating Coercive Control and Navigating Digital Autonomy.</title>
<pages>832:1-832:21</pages>
<year>2025</year>
<booktitle>CHI</booktitle>
<ee>https://doi.org/10.1145/3706598.3713544</ee>
<crossref>conf/chi/2025</crossref>
<url>db/conf/chi/chi2025.html#StephensonRRD25</url>
</inproceedings>
</r>
<r><inproceedings key="conf/uss/FabregaBNR25" mdate="2025-10-31">
<author pid="333/8848">Andr&#233;s F&#225;brega</author>
<author pid="417/9163">Samuel Breckenridge</author>
<author pid="301/5856">Armin Namavari</author>
<author pid="26/3399">Thomas Ristenpart</author>
<title>Mitigating Injection Attacks against E2EE Applications via View-Based Partitioning.</title>
<pages>2965-2984</pages>
<year>2025</year>
<booktitle>USENIX Security Symposium</booktitle>
<ee type="oa">https://www.usenix.org/conference/usenixsecurity25/presentation/fabrega-partitioning</ee>
<crossref>conf/uss/2025</crossref>
<url>db/conf/uss/uss2025.html#FabregaBNR25</url>
</inproceedings>
</r>
<r><inproceedings key="conf/uss/DaffallaBW0DBR25" mdate="2025-10-31">
<author pid="303/6545">Alaa Daffalla</author>
<author pid="372/4046">Arkaprabha Bhattacharya</author>
<author pid="419/0657">Jacob Wilder</author>
<author pid="03/9962">Rahul Chatterjee 0001</author>
<author pid="75/11301">Nicola Dell</author>
<author pid="217/9409">Rosanna Bellini</author>
<author pid="26/3399">Thomas Ristenpart</author>
<title>A Framework for Abusability Analysis: The Case of Passkeys in Interpersonal Threat Models.</title>
<pages>7819-7838</pages>
<year>2025</year>
<booktitle>USENIX Security Symposium</booktitle>
<ee type="oa">https://www.usenix.org/conference/usenixsecurity25/presentation/daffalla</ee>
<crossref>conf/uss/2025</crossref>
<url>db/conf/uss/uss2025.html#DaffallaBW0DBR25</url>
</inproceedings>
</r>
<r><data publtype="version" key="data/11/DaffallaPR25" mdate="2025-08-20">
<author orcid="0000-0003-1264-2353" pid="303/6545">Alaa Daffalla</author>
<author orcid="0000-0002-1433-3020" pid="385/6919">Carolina Ortega P&#233;rez</author>
<author orcid="0000-0002-8642-9558" pid="26/3399">Thomas Ristenpart</author>
<title>Proof-of-concept for paper: Encrypted Access Logging for Online Accounts: Device Attributions without Device Tracking.</title>
<year>2025</year>
<month>January</month>
<ee type="oa">https://doi.org/10.5281/zenodo.14737180</ee>
<publisher>Zenodo</publisher>
<stream>streams/repo/zenodo</stream>
<rel sort="1" label="Version 1" uri="https://doi.org/10.5281/zenodo.14737179" type="versionOf">data/11/DaffallaPR25d</rel>
</data>
</r>
<r><data publtype="version" key="data/11/DaffallaPR25a" mdate="2025-08-20">
<author orcid="0000-0003-1264-2353" pid="303/6545">Alaa Daffalla</author>
<author orcid="0000-0002-1433-3020" pid="385/6919">Carolina Ortega P&#233;rez</author>
<author orcid="0000-0002-8642-9558" pid="26/3399">Thomas Ristenpart</author>
<title>Proof-of-concept for paper: Encrypted Access Logging for Online Accounts: Device Attributions without Device Tracking.</title>
<year>2025</year>
<month>January</month>
<ee type="oa">https://doi.org/10.5281/zenodo.14737541</ee>
<publisher>Zenodo</publisher>
<stream>streams/repo/zenodo</stream>
<rel sort="2" label="Version 2" uri="https://doi.org/10.5281/zenodo.14737179" type="versionOf">data/11/DaffallaPR25d</rel>
</data>
</r>
<r><data publtype="version" key="data/11/DaffallaPR25b" mdate="2025-08-20">
<author orcid="0000-0003-1264-2353" pid="303/6545">Alaa Daffalla</author>
<author orcid="0000-0002-1433-3020" pid="385/6919">Carolina Ortega P&#233;rez</author>
<author orcid="0000-0002-8642-9558" pid="26/3399">Thomas Ristenpart</author>
<title>Proof-of-concept for paper: Encrypted Access Logging for Online Accounts: Device Attributions without Device Tracking.</title>
<year>2025</year>
<month>January</month>
<ee type="oa">https://doi.org/10.5281/zenodo.14737992</ee>
<publisher>Zenodo</publisher>
<stream>streams/repo/zenodo</stream>
<rel sort="3" label="Version 3" uri="https://doi.org/10.5281/zenodo.14737179" type="versionOf">data/11/DaffallaPR25d</rel>
</data>
</r>
<r><data publtype="version" key="data/11/DaffallaPR25c" mdate="2025-08-20">
<author orcid="0000-0003-1264-2353" pid="303/6545">Alaa Daffalla</author>
<author orcid="0000-0002-1433-3020" pid="385/6919">Carolina Ortega P&#233;rez</author>
<author orcid="0000-0002-8642-9558" pid="26/3399">Thomas Ristenpart</author>
<title>Proof-of-concept for paper: Encrypted Access Logging for Online Accounts: Device Attributions without Device Tracking.</title>
<year>2025</year>
<month>January</month>
<ee type="oa">https://doi.org/10.5281/zenodo.14738061</ee>
<publisher>Zenodo</publisher>
<stream>streams/repo/zenodo</stream>
<rel sort="4" label="Version 4" uri="https://doi.org/10.5281/zenodo.14737179" type="versionOf">data/11/DaffallaPR25d</rel>
</data>
</r>
<r><data publtype="version" key="data/11/DaffallaPR25e" mdate="2025-10-27">
<author orcid="0000-0003-1264-2353" pid="303/6545">Alaa Daffalla</author>
<author orcid="0000-0002-1433-3020" pid="385/6919">Carolina Ortega P&#233;rez</author>
<author orcid="0000-0002-8642-9558" pid="26/3399">Thomas Ristenpart</author>
<title>Proof-of-concept for paper: Encrypted Access Logging for Online Accounts: Device Attributions without Device Tracking.</title>
<year>2025</year>
<month>April</month>
<ee type="oa">https://doi.org/10.5281/zenodo.15133677</ee>
<publisher>Zenodo</publisher>
<stream>streams/repo/zenodo</stream>
<rel sort="5" label="Version 5" uri="https://doi.org/10.5281/zenodo.14737179" type="versionOf">data/11/DaffallaPR25d</rel>
</data>
</r>
<r><data publtype="version" key="data/11/FabregaBNR25" mdate="2025-11-10">
<author orcid="0000-0001-7247-5775" pid="333/8848">Andr&#233;s F&#225;brega</author>
<author orcid="0009-0001-4595-0136" pid="417/9163">Samuel Breckenridge</author>
<author orcid="0000-0001-6890-3490" pid="301/5856">Armin Namavari</author>
<author orcid="0000-0002-8642-9558" pid="26/3399">Thomas Ristenpart</author>
<title>injection-attacks-mitigation-framework (Usenix security 25' cycle 2 1169 artifact evaluation).</title>
<year>2025</year>
<month>June</month>
<ee type="oa">https://doi.org/10.5281/zenodo.15586638</ee>
<publisher>Zenodo</publisher>
<stream>streams/repo/zenodo</stream>
<rel sort="1" label="Version 1" uri="https://doi.org/10.5281/zenodo.15586637" type="versionOf">data/11/FabregaBNR25b</rel>
</data>
</r>
<r><data publtype="version" key="data/11/FabregaBNR25a" mdate="2025-11-10">
<author orcid="0000-0001-7247-5775" pid="333/8848">Andr&#233;s F&#225;brega</author>
<author orcid="0009-0001-4595-0136" pid="417/9163">Samuel Breckenridge</author>
<author orcid="0000-0001-6890-3490" pid="301/5856">Armin Namavari</author>
<author orcid="0000-0002-8642-9558" pid="26/3399">Thomas Ristenpart</author>
<title>injection-attacks-mitigation-framework (Usenix security 25' cycle 2 1169 artifact evaluation).</title>
<year>2025</year>
<month>June</month>
<ee type="oa">https://doi.org/10.5281/zenodo.15645001</ee>
<publisher>Zenodo</publisher>
<stream>streams/repo/zenodo</stream>
<rel sort="2" label="Version 2" uri="https://doi.org/10.5281/zenodo.15586637" type="versionOf">data/11/FabregaBNR25b</rel>
</data>
</r>
<r><article publtype="informal" key="journals/corr/abs-2501-01818" mdate="2025-02-17">
<author pid="254/2733">Avital Shafran</author>
<author pid="180/8190">Roei Schuster</author>
<author pid="26/3399">Thomas Ristenpart</author>
<author pid="46/6275">Vitaly Shmatikov</author>
<title>Rerouting LLM Routers.</title>
<year>2025</year>
<month>January</month>
<volume>abs/2501.01818</volume>
<journal>CoRR</journal>
<ee type="oa">https://doi.org/10.48550/arXiv.2501.01818</ee>
<url>db/journals/corr/corr2501.html#abs-2501-01818</url>
<stream>streams/journals/corr</stream>
</article>
</r>
<r><article publtype="informal" key="journals/corr/abs-2507-19391" mdate="2025-08-21">
<author pid="301/5856">Armin Namavari</author>
<author pid="26/3399">Thomas Ristenpart</author>
<title>Transcript Franking for Encrypted Messaging.</title>
<year>2025</year>
<month>July</month>
<volume>abs/2507.19391</volume>
<journal>CoRR</journal>
<ee type="oa">https://doi.org/10.48550/arXiv.2507.19391</ee>
<url>db/journals/corr/corr2507.html#abs-2507-19391</url>
<stream>streams/journals/corr</stream>
</article>
</r>
<r><article publtype="informal" key="journals/iacr/GueronR25" mdate="2025-05-27">
<author pid="38/1135">Shay Gueron</author>
<author pid="26/3399">Thomas Ristenpart</author>
<title>DNDK: Combining Nonce and Key Derivation for Fast and Scalable AEAD.</title>
<pages>785</pages>
<year>2025</year>
<volume>2025</volume>
<journal>IACR Cryptol. ePrint Arch.</journal>
<ee type="oa">https://eprint.iacr.org/2025/785</ee>
<url>db/journals/iacr/iacr2025.html#GueronR25</url>
<stream>streams/journals/iacr</stream>
</article>
</r>
<r><article publtype="informal" key="journals/iacr/PerezRL25" mdate="2025-10-28">
<author pid="385/6919">Carolina Ortega P&#233;rez</author>
<author pid="26/3399">Thomas Ristenpart</author>
<author pid="207/6590">Julia Len</author>
<title>Interoperable Symmetric Message Franking.</title>
<pages>1872</pages>
<year>2025</year>
<volume>2025</volume>
<journal>IACR Cryptol. ePrint Arch.</journal>
<ee type="oa">https://eprint.iacr.org/2025/1872</ee>
<url>db/journals/iacr/iacr2025.html#PerezRL25</url>
<stream>streams/journals/iacr</stream>
</article>
</r>
<r><article publtype="informal" key="journals/iacr/FabregaLRR25" mdate="2026-01-13">
<author pid="333/8848">Andr&#233;s F&#225;brega</author>
<author pid="207/6590">Julia Len</author>
<author pid="26/3399">Thomas Ristenpart</author>
<author pid="423/3664">Gregory Rubin</author>
<title>Random-Access AEAD for Fast Lightweight Online Encryption.</title>
<pages>2275</pages>
<year>2025</year>
<volume>2025</volume>
<journal>IACR Cryptol. ePrint Arch.</journal>
<ee type="oa">https://eprint.iacr.org/2025/2275</ee>
<url>db/journals/iacr/iacr2025.html#FabregaLRR25</url>
<stream>streams/journals/iacr</stream>
</article>
</r>
<r><article key="journals/pacmhci/TsengBLRRD24" mdate="2024-08-02">
<author orcid="0000-0003-1087-1101" pid="245/6107">Emily Tseng</author>
<author orcid="0000-0002-2223-2801" pid="217/9409">Rosanna Bellini</author>
<author orcid="0009-0001-6113-0904" pid="381/1776">Yeuk-Yu Lee</author>
<author orcid="0009-0004-9547-6681" pid="252/6200">Alana Ramjit</author>
<author orcid="0000-0002-8642-9558" pid="26/3399">Thomas Ristenpart</author>
<author orcid="0000-0002-6119-705X" pid="75/11301">Nicola Dell</author>
<title>Data Stewardship in Clinical Computer Security: Balancing Benefit and Burden in Participatory Systems.</title>
<pages>1-29</pages>
<year>2024</year>
<volume>8</volume>
<journal>Proc. ACM Hum. Comput. Interact.</journal>
<number>CSCW1</number>
<ee>https://doi.org/10.1145/3637316</ee>
<url>db/journals/pacmhci/pacmhci8.html#TsengBLRRD24</url>
<stream>streams/journals/pacmhci</stream>
</article>
</r>
<r><inproceedings key="conf/crypto/ShafranMRST24" mdate="2024-08-28">
<author pid="254/2733">Avital Shafran</author>
<author pid="202/2566">Eran Malach</author>
<author pid="26/3399">Thomas Ristenpart</author>
<author pid="s/GilSegev">Gil Segev 0001</author>
<author pid="38/937">Stefano Tessaro</author>
<title>Is ML-Based Cryptanalysis Inherently Limited? Simulating Cryptographic Adversaries via Gradient-Based Methods.</title>
<pages>37-71</pages>
<year>2024</year>
<booktitle>CRYPTO (6)</booktitle>
<ee>https://doi.org/10.1007/978-3-031-68391-6_2</ee>
<crossref>conf/crypto/2024-6</crossref>
<url>db/conf/crypto/crypto2024-6.html#ShafranMRST24</url>
<stream>streams/conf/crypto</stream>
</inproceedings>
</r>
<r><inproceedings key="conf/sp/BelliniTWDMCWKMCDR24" mdate="2026-02-01">
<author orcid="0000-0002-2223-2801" pid="217/9409">Rosanna Bellini</author>
<author orcid="0000-0003-1087-1101" pid="245/6107">Emily Tseng</author>
<author pid="239/0184">Noel Warford</author>
<author pid="303/6545">Alaa Daffalla</author>
<author pid="57/1705">Tara Matthews</author>
<author pid="61/1413">Sunny Consolvo</author>
<author pid="14/2453">Jill Palzkill Woelfer</author>
<author pid="15/3631">Patrick Gage Kelley</author>
<author pid="20/7983">Michelle L. Mazurek</author>
<author pid="356/3064">Dana Cuomo</author>
<author pid="75/11301">Nicola Dell</author>
<author pid="26/3399">Thomas Ristenpart</author>
<title>SoK: Safer Digital-Safety Research Involving At-Risk Users.</title>
<pages>635-654</pages>
<year>2024</year>
<booktitle>SP</booktitle>
<ee>https://doi.org/10.1109/SP54263.2024.00071</ee>
<crossref>conf/sp/2024</crossref>
<url>db/conf/sp/sp2024.html#BelliniTWDMCWKMCDR24</url>
<stream>streams/conf/sp</stream>
</inproceedings>
</r>
<r><inproceedings key="conf/sp/NamavariWMNTGZR24" mdate="2024-09-21">
<author pid="301/5856">Armin Namavari</author>
<author pid="320/5158">Barry Wang</author>
<author pid="213/7956">Sanketh Menda</author>
<author pid="192/2096">Ben Nassi</author>
<author pid="174/4813">Nirvan Tyagi</author>
<author pid="54/1653">James Grimmelmann</author>
<author pid="133/8390">Amy X. Zhang</author>
<author pid="26/3399">Thomas Ristenpart</author>
<title>Private Hierarchical Governance for Encrypted Messaging.</title>
<pages>2610-2629</pages>
<year>2024</year>
<booktitle>SP</booktitle>
<ee>https://doi.org/10.1109/SP54263.2024.00235</ee>
<crossref>conf/sp/2024</crossref>
<url>db/conf/sp/sp2024.html#NamavariWMNTGZR24</url>
<stream>streams/conf/sp</stream>
</inproceedings>
</r>
<r><inproceedings key="conf/sp/FabregaPNNAR24" mdate="2024-09-21">
<author pid="333/8848">Andr&#233;s F&#225;brega</author>
<author pid="385/6919">Carolina Ortega P&#233;rez</author>
<author pid="301/5856">Armin Namavari</author>
<author pid="192/2096">Ben Nassi</author>
<author pid="41/5447-1">Rachit Agarwal 0001</author>
<author pid="26/3399">Thomas Ristenpart</author>
<title>Injection Attacks Against End-to-End Encrypted Applications.</title>
<pages>2648-2665</pages>
<year>2024</year>
<booktitle>SP</booktitle>
<ee>https://doi.org/10.1109/SP54263.2024.00082</ee>
<crossref>conf/sp/2024</crossref>
<url>db/conf/sp/sp2024.html#FabregaPNNAR24</url>
<stream>streams/conf/sp</stream>
</inproceedings>
</r>
<r><inproceedings key="conf/uss/FabregaN0NR24" mdate="2024-07-22">
<author pid="333/8848">Andr&#233;s F&#225;brega</author>
<author pid="301/5856">Armin Namavari</author>
<author pid="41/5447-1">Rachit Agarwal 0001</author>
<author pid="192/2096">Ben Nassi</author>
<author pid="26/3399">Thomas Ristenpart</author>
<title>Exploiting Leakage in Password Managers via Injection Attacks.</title>
<year>2024</year>
<booktitle>USENIX Security Symposium</booktitle>
<ee type="oa">https://www.usenix.org/conference/usenixsecurity24/presentation/fabrega</ee>
<crossref>conf/uss/2024</crossref>
<url>db/conf/uss/uss2024.html#FabregaN0NR24</url>
</inproceedings>
</r>
<r><inproceedings key="conf/uss/RamjitD0GRC24" mdate="2024-07-22">
<author pid="252/6200">Lana Ramjit</author>
<author pid="381/1643">Natalie Dolci</author>
<author pid="r/FrancescaRossi">Francesca Rossi 0001</author>
<author pid="381/1602">Ryan Garcia</author>
<author pid="26/3399">Thomas Ristenpart</author>
<author pid="356/3064">Dana Cuomo</author>
<title>Navigating Traumatic Stress Reactions During Computer Security Interventions.</title>
<year>2024</year>
<booktitle>USENIX Security Symposium</booktitle>
<ee type="oa">https://www.usenix.org/conference/usenixsecurity24/presentation/ramjit</ee>
<crossref>conf/uss/2024</crossref>
<url>db/conf/uss/uss2024.html#RamjitD0GRC24</url>
</inproceedings>
</r>
<r><article publtype="informal" key="journals/corr/abs-2406-19433" mdate="2024-07-24">
<author pid="301/5856">Armin Namavari</author>
<author pid="320/5158">Barry Wang</author>
<author pid="213/7956">Sanketh Menda</author>
<author pid="192/2096">Ben Nassi</author>
<author pid="174/4813">Nirvan Tyagi</author>
<author pid="54/1653">James Grimmelmann</author>
<author pid="133/8390">Amy X. Zhang</author>
<author pid="26/3399">Thomas Ristenpart</author>
<title>Private Hierarchical Governance for Encrypted Messaging.</title>
<year>2024</year>
<volume>abs/2406.19433</volume>
<journal>CoRR</journal>
<ee type="oa">https://doi.org/10.48550/arXiv.2406.19433</ee>
<url>db/journals/corr/corr2406.html#abs-2406-19433</url>
<stream>streams/journals/corr</stream>
</article>
</r>
<r><article publtype="informal" key="journals/corr/abs-2408-07054" mdate="2024-09-23">
<author pid="333/8848">Andr&#233;s F&#225;brega</author>
<author pid="301/5856">Armin Namavari</author>
<author pid="41/5447-1">Rachit Agarwal 0001</author>
<author pid="192/2096">Ben Nassi</author>
<author pid="26/3399">Thomas Ristenpart</author>
<title>Exploiting Leakage in Password Managers via Injection Attacks.</title>
<year>2024</year>
<volume>abs/2408.07054</volume>
<journal>CoRR</journal>
<ee type="oa">https://doi.org/10.48550/arXiv.2408.07054</ee>
<url>db/journals/corr/corr2408.html#abs-2408-07054</url>
<stream>streams/journals/corr</stream>
</article>
</r>
<r><article publtype="informal" key="journals/corr/abs-2411-09228" mdate="2025-01-01">
<author pid="333/8848">Andr&#233;s F&#225;brega</author>
<author pid="385/6919">Carolina Ortega P&#233;rez</author>
<author pid="301/5856">Armin Namavari</author>
<author pid="192/2096">Ben Nassi</author>
<author pid="41/5447-1">Rachit Agarwal 0001</author>
<author pid="26/3399">Thomas Ristenpart</author>
<title>Injection Attacks Against End-to-End Encrypted Applications.</title>
<year>2024</year>
<volume>abs/2411.09228</volume>
<journal>CoRR</journal>
<ee type="oa">https://doi.org/10.48550/arXiv.2411.09228</ee>
<url>db/journals/corr/corr2411.html#abs-2411-09228</url>
<stream>streams/journals/corr</stream>
</article>
</r>
<r><article publtype="informal" key="journals/corr/abs-2412-16866" mdate="2025-01-24">
<author pid="245/6107">Emily Tseng</author>
<author pid="26/3399">Thomas Ristenpart</author>
<author pid="75/11301">Nicola Dell</author>
<title>Mitigating Trauma in Qualitative Research Infrastructure: Roles for Machine Assistance and Trauma-Informed Design.</title>
<year>2024</year>
<volume>abs/2412.16866</volume>
<journal>CoRR</journal>
<ee type="oa">https://doi.org/10.48550/arXiv.2412.16866</ee>
<url>db/journals/corr/corr2412.html#abs-2412-16866</url>
<stream>streams/journals/corr</stream>
</article>
</r>
<r><article publtype="informal" key="journals/iacr/ShafranMRST24" mdate="2024-08-02">
<author pid="254/2733">Avital Shafran</author>
<author pid="202/2566">Eran Malach</author>
<author pid="26/3399">Thomas Ristenpart</author>
<author pid="s/GilSegev">Gil Segev 0001</author>
<author pid="38/937">Stefano Tessaro</author>
<title>Is ML-Based Cryptanalysis Inherently Limited? Simulating Cryptographic Adversaries via Gradient-Based Methods.</title>
<pages>1126</pages>
<year>2024</year>
<volume>2024</volume>
<journal>IACR Cryptol. ePrint Arch.</journal>
<ee type="oa">https://eprint.iacr.org/2024/1126</ee>
<url>db/journals/iacr/iacr2024.html#ShafranMRST24</url>
<stream>streams/journals/iacr</stream>
</article>
</r>
<r><inproceedings key="conf/eurocrypt/MendaLGR23" mdate="2024-05-07">
<author pid="213/7956">Sanketh Menda</author>
<author pid="207/6590">Julia Len</author>
<author pid="139/2372">Paul Grubbs</author>
<author orcid="0000-0002-8642-9558" pid="26/3399">Thomas Ristenpart</author>
<title>Context Discovery and Commitment Attacks - How to Break CCM, EAX, SIV, and More.</title>
<pages>379-407</pages>
<year>2023</year>
<booktitle>EUROCRYPT (4)</booktitle>
<ee>https://doi.org/10.1007/978-3-031-30634-1_13</ee>
<crossref>conf/eurocrypt/2023-4</crossref>
<url>db/conf/eurocrypt/eurocrypt2023-4.html#MendaLGR23</url>
</inproceedings>
</r>
<r><inproceedings key="conf/uss/BelliniLBSBR23" mdate="2025-10-27">
<author pid="217/9409">Rosanna Bellini</author>
<author pid="44/765-1">Kevin Lee 0001</author>
<author pid="353/7554">Megan A. Brown</author>
<author pid="32/2635">Jeremy Shaffer</author>
<author pid="201/7550">Rasika Bhalerao</author>
<author pid="26/3399">Thomas Ristenpart</author>
<title>The Digital-Safety Risks of Financial Technologies for Survivors of Intimate Partner Violence.</title>
<year>2023</year>
<booktitle>USENIX Security Symposium</booktitle>
<ee type="oa">https://www.usenix.org/conference/usenixsecurity23/presentation/bellini</ee>
<crossref>conf/uss/2023</crossref>
<url>db/conf/uss/uss2023.html#BelliniLBSBR23</url>
<pages>87-104</pages>
</inproceedings>
</r>
<r><inproceedings key="conf/uss/IslamBCR023" mdate="2024-01-15">
<author pid="208/1920-2">Mazharul Islam 0002</author>
<author pid="331/2515">Marina Sanusi Bohuk</author>
<author orcid="0009-0004-7065-9019" pid="58/5795">Paul Chung</author>
<author pid="26/3399">Thomas Ristenpart</author>
<author pid="03/9962">Rahul Chatterjee 0001</author>
<title>Ara&#241;a: Discovering and Characterizing Password Guessing Attacks in Practice.</title>
<year>2023</year>
<booktitle>USENIX Security Symposium</booktitle>
<ee type="oa">https://www.usenix.org/conference/usenixsecurity23/presentation/islam</ee>
<crossref>conf/uss/2023</crossref>
<url>db/conf/uss/uss2023.html#IslamBCR023</url>
<pages>1019-1036</pages>
</inproceedings>
</r>
<r><inproceedings key="conf/uss/DaffallaBDBR23" mdate="2023-10-18">
<author pid="303/6545">Alaa Daffalla</author>
<author pid="331/2515">Marina Sanusi Bohuk</author>
<author pid="75/11301">Nicola Dell</author>
<author pid="217/9409">Rosanna Bellini</author>
<author pid="26/3399">Thomas Ristenpart</author>
<title>Account Security Interfaces: Important, Unintuitive, and Untrustworthy.</title>
<year>2023</year>
<booktitle>USENIX Security Symposium</booktitle>
<ee type="oa">https://www.usenix.org/conference/usenixsecurity23/presentation/daffalla</ee>
<crossref>conf/uss/2023</crossref>
<url>db/conf/uss/uss2023.html#DaffallaBDBR23</url>
<pages>3601-3618</pages>
</inproceedings>
</r>
<r><article publtype="informal" key="journals/corr/abs-2309-00735" mdate="2023-09-11">
<author pid="217/9409">Rosanna Bellini</author>
<author pid="245/6107">Emily Tseng</author>
<author pid="239/0184">Noel Warford</author>
<author pid="303/6545">Alaa Daffalla</author>
<author pid="57/1705">Tara Matthews</author>
<author pid="61/1413">Sunny Consolvo</author>
<author pid="14/2453">Jill Palzkill Woelfer</author>
<author pid="15/3631">Patrick Gage Kelley</author>
<author pid="20/7983">Michelle L. Mazurek</author>
<author pid="356/3064">Dana Cuomo</author>
<author pid="75/11301">Nicola Dell</author>
<author pid="26/3399">Thomas Ristenpart</author>
<title>SoK: Safer Digital-Safety Research Involving At-Risk Users.</title>
<year>2023</year>
<volume>abs/2309.00735</volume>
<journal>CoRR</journal>
<ee type="oa">https://doi.org/10.48550/arXiv.2309.00735</ee>
<url>db/journals/corr/corr2309.html#abs-2309-00735</url>
</article>
</r>
<r><article publtype="informal" key="journals/iacr/MendaLGR23" mdate="2023-06-05">
<author pid="213/7956">Sanketh Menda</author>
<author pid="207/6590">Julia Len</author>
<author pid="139/2372">Paul Grubbs</author>
<author pid="26/3399">Thomas Ristenpart</author>
<title>Context Discovery and Commitment Attacks: How to Break CCM, EAX, SIV, and More.</title>
<pages>526</pages>
<year>2023</year>
<volume>2023</volume>
<journal>IACR Cryptol. ePrint Arch.</journal>
<ee type="oa">https://eprint.iacr.org/2023/526</ee>
<url>db/journals/iacr/iacr2023.html#MendaLGR23</url>
</article>
</r>
<r><article key="journals/pacmhci/HuaRRWN22" mdate="2025-01-19">
<author pid="163/3603">Yiqing Hua</author>
<author pid="193/5425">Manoel Horta Ribeiro</author>
<author pid="26/3399">Thomas Ristenpart</author>
<author pid="20/7441-1">Robert West 0001</author>
<author orcid="0000-0002-6436-3877" pid="42/241">Mor Naaman</author>
<title>Characterizing Alternative Monetization Strategies on YouTube.</title>
<pages>1-30</pages>
<year>2022</year>
<volume>6</volume>
<journal>Proc. ACM Hum. Comput. Interact.</journal>
<number>CSCW2</number>
<ee>https://doi.org/10.1145/3555174</ee>
<ee>https://www.wikidata.org/entity/Q131110254</ee>
<url>db/journals/pacmhci/pacmhci6.html#HuaRRWN22</url>
</article>
</r>
<r><inproceedings key="conf/asiacrypt/LenGR22" mdate="2024-05-07">
<author pid="207/6590">Julia Len</author>
<author pid="139/2372">Paul Grubbs</author>
<author orcid="0000-0002-8642-9558" pid="26/3399">Thomas Ristenpart</author>
<title>Authenticated Encryption with Key Identification.</title>
<pages>181-209</pages>
<year>2022</year>
<booktitle>ASIACRYPT (3)</booktitle>
<ee>https://doi.org/10.1007/978-3-031-22969-5_7</ee>
<crossref>conf/asiacrypt/2022-3</crossref>
<url>db/conf/asiacrypt/asiacrypt2022-3.html#LenGR22</url>
</inproceedings>
</r>
<r><inproceedings key="conf/chi/TsengSBSRD22" mdate="2026-02-01">
<author orcid="0000-0003-1087-1101" pid="245/6107">Emily Tseng</author>
<author pid="292/6028">Mehrnaz Sabet</author>
<author pid="217/9409">Rosanna Bellini</author>
<author pid="319/3858">Harkiran Kaur Sodhi</author>
<author pid="26/3399">Thomas Ristenpart</author>
<author pid="75/11301">Nicola Dell</author>
<title>Care Infrastructures for Digital Security in Intimate Partner Violence.</title>
<pages>123:1-123:20</pages>
<year>2022</year>
<booktitle>CHI</booktitle>
<ee>https://doi.org/10.1145/3491102.3502038</ee>
<crossref>conf/chi/2022</crossref>
<url>db/conf/chi/chi2022.html#TsengSBSRD22</url>
</inproceedings>
</r>
<r><inproceedings key="conf/chi/ChenMZTRTSRD22" mdate="2026-02-01">
<author pid="269/2166">Janet X. Chen</author>
<author orcid="0000-0001-7477-6782" pid="205/2107">Allison McDonald</author>
<author orcid="0000-0002-9088-705X" pid="218/0356">Yixin Zou</author>
<author orcid="0000-0003-1087-1101" pid="245/6107">Emily Tseng</author>
<author orcid="0000-0002-8285-1647" pid="36/8412">Kevin A. Roundy</author>
<author pid="79/9389">Acar Tamersoy</author>
<author pid="08/7562">Florian Schaub</author>
<author pid="26/3399">Thomas Ristenpart</author>
<author pid="75/11301">Nicola Dell</author>
<title>Trauma-Informed Computing: Towards Safer Technology Experiences for All.</title>
<pages>544:1-544:20</pages>
<year>2022</year>
<booktitle>CHI</booktitle>
<ee>https://doi.org/10.1145/3491102.3517475</ee>
<crossref>conf/chi/2022</crossref>
<url>db/conf/chi/chi2022.html#ChenMZTRTSRD22</url>
</inproceedings>
</r>
<r><inproceedings key="conf/eurocrypt/TyagiCRSTW22" mdate="2024-10-06">
<author orcid="0000-0002-7671-5681" pid="174/4813">Nirvan Tyagi</author>
<author orcid="0000-0002-3333-7764" pid="296/2589">Sof&#237;a Celi</author>
<author pid="26/3399">Thomas Ristenpart</author>
<author pid="172/5512">Nick Sullivan</author>
<author pid="38/937">Stefano Tessaro</author>
<author pid="163/1886">Christopher A. Wood</author>
<title>A Fast and Simple Partially Oblivious PRF, with Applications.</title>
<pages>674-705</pages>
<year>2022</year>
<booktitle>EUROCRYPT (2)</booktitle>
<ee>https://doi.org/10.1007/978-3-031-07085-3_23</ee>
<crossref>conf/eurocrypt/2022-2</crossref>
<url>db/conf/eurocrypt/eurocrypt2022-2.html#TyagiCRSTW22</url>
</inproceedings>
</r>
<r><inproceedings key="conf/uss/HuaNCNR22" mdate="2022-10-18">
<author pid="163/3603">Yiqing Hua</author>
<author pid="301/5856">Armin Namavari</author>
<author pid="290/2358">Kaishuo Cheng</author>
<author pid="42/241">Mor Naaman</author>
<author pid="26/3399">Thomas Ristenpart</author>
<title>Increasing Adversarial Uncertainty to Scale Private Similarity Testing.</title>
<pages>1777-1794</pages>
<year>2022</year>
<booktitle>USENIX Security Symposium</booktitle>
<ee type="oa">https://www.usenix.org/conference/usenixsecurity22/presentation/hua</ee>
<crossref>conf/uss/2022</crossref>
<url>db/conf/uss/uss2022.html#HuaNCNR22</url>
</inproceedings>
</r>
<r><inproceedings key="conf/uss/PalIBSVWWR022" mdate="2024-01-15">
<author pid="241/9681">Bijeeta Pal</author>
<author pid="208/1920-2">Mazharul Islam 0002</author>
<author pid="331/2515">Marina Sanusi Bohuk</author>
<author pid="172/5512">Nick Sullivan</author>
<author pid="166/6979">Luke Valenta</author>
<author pid="18/300">Tara Whalen</author>
<author pid="163/1886">Christopher A. Wood</author>
<author pid="26/3399">Thomas Ristenpart</author>
<author pid="03/9962">Rahul Chatterjee 0001</author>
<title>Might I Get Pwned: A Second Generation Compromised Credential Checking Service.</title>
<pages>1831-1848</pages>
<year>2022</year>
<booktitle>USENIX Security Symposium</booktitle>
<ee type="oa">https://www.usenix.org/conference/usenixsecurity22/presentation/pal</ee>
<crossref>conf/uss/2022</crossref>
<url>db/conf/uss/uss2022.html#PalIBSVWWR022</url>
</inproceedings>
</r>
<r><inproceedings key="conf/uss/BohukIASR022" mdate="2024-01-15">
<author pid="331/2515">Marina Sanusi Bohuk</author>
<author pid="208/1920-2">Mazharul Islam 0002</author>
<author pid="260/8995">Suleman Ahmad</author>
<author pid="s/MichaelMSwift">Michael M. Swift</author>
<author pid="26/3399">Thomas Ristenpart</author>
<author pid="03/9962">Rahul Chatterjee 0001</author>
<title>Gossamer: Securely Measuring Password-based Logins.</title>
<pages>1867-1884</pages>
<year>2022</year>
<booktitle>USENIX Security Symposium</booktitle>
<ee type="oa">https://www.usenix.org/conference/usenixsecurity22/presentation/sanusi-bohuk</ee>
<crossref>conf/uss/2022</crossref>
<url>db/conf/uss/uss2022.html#BohukIASR022</url>
</inproceedings>
</r>
<r><inproceedings key="conf/uss/TyagiLMR22" mdate="2024-10-06">
<author orcid="0000-0002-7671-5681" pid="174/4813">Nirvan Tyagi</author>
<author pid="207/6590">Julia Len</author>
<author pid="129/9500">Ian Miers</author>
<author pid="26/3399">Thomas Ristenpart</author>
<title>Orca: Blocklisting in Sender-Anonymous Messaging.</title>
<pages>2299-2316</pages>
<year>2022</year>
<booktitle>USENIX Security Symposium</booktitle>
<ee type="oa">https://www.usenix.org/conference/usenixsecurity22/presentation/tyagi</ee>
<crossref>conf/uss/2022</crossref>
<url>db/conf/uss/uss2022.html#TyagiLMR22</url>
</inproceedings>
</r>
<r><article publtype="informal" key="journals/corr/abs-2203-10143" mdate="2024-02-05">
<author pid="163/3603">Yiqing Hua</author>
<author pid="193/5425">Manoel Horta Ribeiro</author>
<author pid="20/7441-1">Robert West 0001</author>
<author pid="26/3399">Thomas Ristenpart</author>
<author orcid="0000-0002-6436-3877" pid="42/241">Mor Naaman</author>
<title>Characterizing Alternative Monetization Strategies on YouTube.</title>
<year>2022</year>
<volume>abs/2203.10143</volume>
<journal>CoRR</journal>
<ee type="oa">https://doi.org/10.48550/arXiv.2203.10143</ee>
<url>db/journals/corr/corr2203.html#abs-2203-10143</url>
</article>
</r>
<r><article publtype="informal" key="journals/iacr/LenGR22" mdate="2023-01-05">
<author pid="207/6590">Julia Len</author>
<author pid="139/2372">Paul Grubbs</author>
<author pid="26/3399">Thomas Ristenpart</author>
<title>Authenticated Encryption with Key Identification.</title>
<pages>1680</pages>
<year>2022</year>
<volume>2022</volume>
<journal>IACR Cryptol. ePrint Arch.</journal>
<ee type="oa">https://eprint.iacr.org/2022/1680</ee>
<url>db/journals/iacr/iacr2022.html#LenGR22</url>
</article>
</r>
<r><inproceedings key="conf/chi/TsengFERD21" mdate="2026-02-01">
<author orcid="0000-0003-1087-1101" pid="245/6107">Emily Tseng</author>
<author pid="175/1690">Diana Freed</author>
<author orcid="0000-0003-4275-1788" pid="292/6074">Kristen Engel</author>
<author pid="26/3399">Thomas Ristenpart</author>
<author pid="75/11301">Nicola Dell</author>
<title>A Digital Safety Dilemma: Analysis of Computer-Mediated Computer Security Interventions for Intimate Partner Violence During COVID-19.</title>
<pages>71:1-71:17</pages>
<year>2021</year>
<booktitle>CHI</booktitle>
<ee>https://doi.org/10.1145/3411764.3445589</ee>
<ee>https://www.wikidata.org/entity/Q130980071</ee>
<crossref>conf/chi/2021</crossref>
<url>db/conf/chi/chi2021.html#TsengFERD21</url>
</inproceedings>
</r>
<r><inproceedings key="conf/sp/ThomasABBBCDDKK21" mdate="2023-10-26">
<author pid="68/8283">Kurt Thomas</author>
<author pid="12/8302">Devdatta Akhawe</author>
<author pid="359/0958">Michael D. Bailey</author>
<author pid="b/DanBoneh">Dan Boneh</author>
<author pid="20/7004">Elie Bursztein</author>
<author pid="61/1413">Sunny Consolvo</author>
<author pid="75/11301">Nicola Dell</author>
<author pid="143/5673">Zakir Durumeric</author>
<author pid="15/3631">Patrick Gage Kelley</author>
<author pid="66/3984-6">Deepak Kumar 0006</author>
<author pid="58/4016">Damon McCoy</author>
<author pid="94/8813">Sarah Meiklejohn</author>
<author pid="26/3399">Thomas Ristenpart</author>
<author pid="86/8823">Gianluca Stringhini</author>
<title>SoK: Hate, Harassment, and the Changing Landscape of Online Abuse.</title>
<pages>247-267</pages>
<year>2021</year>
<booktitle>SP</booktitle>
<ee>https://doi.org/10.1109/SP40001.2021.00028</ee>
<crossref>conf/sp/2021</crossref>
<url>db/conf/sp/sp2021.html#ThomasABBBCDDKK21</url>
</inproceedings>
</r>
<r><inproceedings key="conf/uss/LenGR21" mdate="2021-09-16">
<author pid="207/6590">Julia Len</author>
<author pid="139/2372">Paul Grubbs</author>
<author pid="26/3399">Thomas Ristenpart</author>
<title>Partitioning Oracle Attacks.</title>
<pages>195-212</pages>
<year>2021</year>
<booktitle>USENIX Security Symposium</booktitle>
<ee type="oa">https://www.usenix.org/conference/usenixsecurity21/presentation/len</ee>
<crossref>conf/uss/2021</crossref>
<url>db/conf/uss/uss2021.html#LenGR21</url>
</inproceedings>
</r>
<r><inproceedings key="conf/uss/ZouMNDRRST21" mdate="2021-09-16">
<author pid="218/0356">Yixin Zou</author>
<author pid="205/2107">Allison McDonald</author>
<author pid="301/5898">Julia Narakornpichit</author>
<author pid="75/11301">Nicola Dell</author>
<author pid="26/3399">Thomas Ristenpart</author>
<author pid="36/8412">Kevin A. Roundy</author>
<author pid="08/7562">Florian Schaub</author>
<author pid="79/9389">Acar Tamersoy</author>
<title>The Role of Computer Security Customer Support in Helping Survivors of Intimate Partner Violence.</title>
<pages>429-446</pages>
<year>2021</year>
<booktitle>USENIX Security Symposium</booktitle>
<ee type="oa">https://www.usenix.org/conference/usenixsecurity21/presentation/zou</ee>
<crossref>conf/uss/2021</crossref>
<url>db/conf/uss/uss2021.html#ZouMNDRRST21</url>
</inproceedings>
</r>
<r><inproceedings key="conf/uss/XuNCR21" mdate="2021-09-16">
<author pid="09/0">Min Xu</author>
<author pid="301/5856">Armin Namavari</author>
<author pid="68/158">David Cash</author>
<author pid="26/3399">Thomas Ristenpart</author>
<title>Searching Encrypted Data with Size-Locked Indexes.</title>
<pages>4025-4042</pages>
<year>2021</year>
<booktitle>USENIX Security Symposium</booktitle>
<ee type="oa">https://www.usenix.org/conference/usenixsecurity21/presentation/xu-min</ee>
<crossref>conf/uss/2021</crossref>
<url>db/conf/uss/uss2021.html#XuNCR21</url>
</inproceedings>
</r>
<r><article publtype="informal" key="journals/corr/abs-2109-01727" mdate="2021-09-20">
<author pid="163/3603">Yiqing Hua</author>
<author pid="301/5856">Armin Namavari</author>
<author pid="290/2358">Kaishuo Cheng</author>
<author pid="42/241">Mor Naaman</author>
<author pid="26/3399">Thomas Ristenpart</author>
<title>Increasing Adversarial Uncertainty to Scale Private Similarity Testing.</title>
<year>2021</year>
<volume>abs/2109.01727</volume>
<journal>CoRR</journal>
<ee type="oa">https://arxiv.org/abs/2109.01727</ee>
<url>db/journals/corr/corr2109.html#abs-2109-01727</url>
</article>
</r>
<r><article publtype="informal" key="journals/corr/abs-2109-14490" mdate="2024-01-15">
<author pid="241/9681">Bijeeta Pal</author>
<author pid="208/1920-2">Mazharul Islam 0002</author>
<author pid="26/3399">Thomas Ristenpart</author>
<author pid="03/9962">Rahul Chatterjee 0001</author>
<title>Might I Get Pwned: A Second Generation Password Breach Alerting Service.</title>
<year>2021</year>
<volume>abs/2109.14490</volume>
<journal>CoRR</journal>
<ee type="oa">https://arxiv.org/abs/2109.14490</ee>
<url>db/journals/corr/corr2109.html#abs-2109-14490</url>
</article>
</r>
<r><article publtype="informal" key="journals/iacr/TyagiCRSTW21" mdate="2021-09-06">
<author pid="174/4813">Nirvan Tyagi</author>
<author pid="296/2589">Sof&#237;a Celi</author>
<author pid="26/3399">Thomas Ristenpart</author>
<author pid="172/5512">Nick Sullivan</author>
<author pid="38/937">Stefano Tessaro</author>
<author pid="163/1886">Christopher A. Wood</author>
<title>A Fast and Simple Partially Oblivious PRF, with Applications.</title>
<pages>864</pages>
<year>2021</year>
<volume>2021</volume>
<journal>IACR Cryptol. ePrint Arch.</journal>
<ee type="oa">https://eprint.iacr.org/2021/864</ee>
<url>db/journals/iacr/iacr2021.html#TyagiCRSTW21</url>
</article>
</r>
<r><article publtype="informal" key="journals/iacr/TyagiLMR21" mdate="2021-11-12">
<author pid="174/4813">Nirvan Tyagi</author>
<author pid="207/6590">Julia Len</author>
<author pid="129/9500">Ian Miers</author>
<author pid="26/3399">Thomas Ristenpart</author>
<title>Orca: Blocklisting in Sender-Anonymous Messaging.</title>
<pages>1380</pages>
<year>2021</year>
<volume>2021</volume>
<journal>IACR Cryptol. ePrint Arch.</journal>
<ee type="oa">https://eprint.iacr.org/2021/1380</ee>
<url>db/journals/iacr/iacr2021.html#TyagiLMR21</url>
</article>
</r>
<r><article key="journals/pacmhci/BelliniTMGMRD20" mdate="2026-02-01">
<author pid="217/9409">Rosanna Bellini</author>
<author orcid="0000-0003-1087-1101" pid="245/6107">Emily Tseng</author>
<author orcid="0000-0003-0216-5573" pid="128/9352">Nora McDonald</author>
<author pid="93/655">Rachel Greenstadt</author>
<author pid="58/4016">Damon McCoy</author>
<author pid="26/3399">Thomas Ristenpart</author>
<author pid="75/11301">Nicola Dell</author>
<title>&#34;So-called privacy breeds evil&#34;: Narrative Justifications for Intimate Partner Surveillance in Online Forums.</title>
<pages>1-27</pages>
<year>2020</year>
<volume>4</volume>
<journal>Proc. ACM Hum. Comput. Interact.</journal>
<number>CSCW3</number>
<ee>https://doi.org/10.1145/3432909</ee>
<ee>https://www.wikidata.org/entity/Q130894410</ee>
<url>db/journals/pacmhci/pacmhci4.html#BelliniTMGMRD20</url>
</article>
</r>
<r><inproceedings key="conf/chi/HuaNR20" mdate="2024-02-05">
<author pid="163/3603">Yiqing Hua</author>
<author orcid="0000-0002-6436-3877" pid="42/241">Mor Naaman</author>
<author pid="26/3399">Thomas Ristenpart</author>
<title>Characterizing Twitter Users Who Engage in Adversarial Interactions against Political Candidates.</title>
<pages>1-13</pages>
<year>2020</year>
<booktitle>CHI</booktitle>
<ee>https://doi.org/10.1145/3313831.3376548</ee>
<crossref>conf/chi/2020</crossref>
<url>db/conf/chi/chi2020.html#HuaNR20</url>
</inproceedings>
</r>
<r><inproceedings key="conf/icwsm/HuaRN20" mdate="2022-03-07">
<author pid="163/3603">Yiqing Hua</author>
<author pid="26/3399">Thomas Ristenpart</author>
<author pid="42/241">Mor Naaman</author>
<title>Towards Measuring Adversarial Twitter Interactions against Candidates in the US Midterm Elections.</title>
<pages>272-282</pages>
<year>2020</year>
<booktitle>ICWSM</booktitle>
<ee type="oa">https://ojs.aaai.org/index.php/ICWSM/article/view/7298</ee>
<crossref>conf/icwsm/2020</crossref>
<url>db/conf/icwsm/icwsm2020.html#HuaRN20</url>
</inproceedings>
</r>
<r><inproceedings key="conf/sp/RoundyMDMNRT20" mdate="2023-09-21">
<author orcid="0000-0002-8285-1647" pid="36/8412">Kevin A. Roundy</author>
<author pid="272/8310">Paula Barmaimon Mendelberg</author>
<author pid="75/11301">Nicola Dell</author>
<author pid="58/4016">Damon McCoy</author>
<author pid="272/8280">Daniel Nissani</author>
<author pid="26/3399">Thomas Ristenpart</author>
<author pid="79/9389">Acar Tamersoy</author>
<title>The Many Kinds of Creepware Used for Interpersonal Attacks.</title>
<pages>626-643</pages>
<year>2020</year>
<booktitle>SP</booktitle>
<ee>https://doi.org/10.1109/SP40000.2020.00069</ee>
<crossref>conf/sp/2020</crossref>
<url>db/conf/sp/sp2020.html#RoundyMDMNRT20</url>
</inproceedings>
</r>
<r><inproceedings key="conf/uss/TsengBMDGMDR20" mdate="2021-01-29">
<author pid="245/6107">Emily Tseng</author>
<author pid="217/9409">Rosanna Bellini</author>
<author pid="128/9352">Nora McDonald</author>
<author pid="231/1859">Matan Danos</author>
<author pid="93/655">Rachel Greenstadt</author>
<author pid="58/4016">Damon McCoy</author>
<author pid="75/11301">Nicola Dell</author>
<author pid="26/3399">Thomas Ristenpart</author>
<title>The Tools and Tactics Used in Intimate Partner Surveillance: An Analysis of Online Infidelity Forums.</title>
<pages>1893-1909</pages>
<year>2020</year>
<booktitle>USENIX Security Symposium</booktitle>
<ee type="oa">https://www.usenix.org/conference/usenixsecurity20/presentation/tseng</ee>
<crossref>conf/uss/2020</crossref>
<url>db/conf/uss/uss2020.html#TsengBMDGMDR20</url>
</inproceedings>
</r>
<r><inproceedings key="conf/uss/GrubbsKLBL0R20" mdate="2021-01-29">
<author pid="139/2372">Paul Grubbs</author>
<author pid="162/1936">Anurag Khandelwal</author>
<author pid="172/4062">Marie-Sarah Lacharit&#233;</author>
<author pid="272/7111">Lloyd Brown</author>
<author pid="174/9518">Lucy Li</author>
<author pid="41/5447-1">Rachit Agarwal 0001</author>
<author pid="26/3399">Thomas Ristenpart</author>
<title>Pancake: Frequency Smoothing for Encrypted Data Stores.</title>
<pages>2451-2468</pages>
<year>2020</year>
<booktitle>USENIX Security Symposium</booktitle>
<ee type="oa">https://www.usenix.org/conference/usenixsecurity20/presentation/grubbs</ee>
<crossref>conf/uss/2020</crossref>
<url>db/conf/uss/uss2020.html#GrubbsKLBL0R20</url>
</inproceedings>
</r>
<r><proceedings key="conf/crypto/2020-1" mdate="2020-08-12">
<editor orcid="0000-0003-3323-9985" pid="03/3331">Daniele Micciancio</editor>
<editor orcid="0000-0002-8642-9558" pid="26/3399">Thomas Ristenpart</editor>
<title>Advances in Cryptology - CRYPTO 2020 - 40th Annual International Cryptology Conference, CRYPTO 2020, Santa Barbara, CA, USA, August 17-21, 2020, Proceedings, Part I</title>
<booktitle>CRYPTO (1)</booktitle>
<publisher>Springer</publisher>
<year>2020</year>
<series href="db/series/lncs/index.html">Lecture Notes in Computer Science</series>
<volume>12170</volume>
<isbn>978-3-030-56783-5</isbn>
<isbn>978-3-030-56784-2</isbn>
<ee>https://doi.org/10.1007/978-3-030-56784-2</ee>
<url>db/conf/crypto/crypto2020-1.html</url>
</proceedings>
</r>
<r><proceedings key="conf/crypto/2020-2" mdate="2020-08-13">
<editor orcid="0000-0003-3323-9985" pid="03/3331">Daniele Micciancio</editor>
<editor orcid="0000-0002-8642-9558" pid="26/3399">Thomas Ristenpart</editor>
<title>Advances in Cryptology - CRYPTO 2020 - 40th Annual International Cryptology Conference, CRYPTO 2020, Santa Barbara, CA, USA, August 17-21, 2020, Proceedings, Part II</title>
<booktitle>CRYPTO (2)</booktitle>
<publisher>Springer</publisher>
<year>2020</year>
<series href="db/series/lncs/index.html">Lecture Notes in Computer Science</series>
<volume>12171</volume>
<isbn>978-3-030-56879-5</isbn>
<isbn>978-3-030-56880-1</isbn>
<ee>https://doi.org/10.1007/978-3-030-56880-1</ee>
<url>db/conf/crypto/crypto2020-2.html</url>
</proceedings>
</r>
<r><proceedings key="conf/crypto/2020-3" mdate="2023-08-28">
<editor orcid="0000-0003-3323-9985" pid="03/3331">Daniele Micciancio</editor>
<editor orcid="0000-0002-8642-9558" pid="26/3399">Thomas Ristenpart</editor>
<title>Advances in Cryptology - CRYPTO 2020 - 40th Annual International Cryptology Conference, CRYPTO 2020, Santa Barbara, CA, USA, August 17-21, 2020, Proceedings, Part III</title>
<booktitle>CRYPTO (3)</booktitle>
<publisher>Springer</publisher>
<year>2020</year>
<series href="db/series/lncs/index.html">Lecture Notes in Computer Science</series>
<volume>12172</volume>
<isbn>978-3-030-56876-4</isbn>
<isbn>978-3-030-56877-1</isbn>
<ee>https://doi.org/10.1007/978-3-030-56877-1</ee>
<ee>https://www.wikidata.org/entity/Q119496647</ee>
<url>db/conf/crypto/crypto2020-3.html</url>
</proceedings>
</r>
<r><article publtype="informal" key="journals/corr/abs-2005-04411" mdate="2020-05-14">
<author pid="163/3603">Yiqing Hua</author>
<author pid="26/3399">Thomas Ristenpart</author>
<author pid="42/241">Mor Naaman</author>
<title>Towards Measuring Adversarial Twitter Interactions against Candidates in the US Midterm Elections.</title>
<year>2020</year>
<volume>abs/2005.04411</volume>
<journal>CoRR</journal>
<ee type="oa">https://arxiv.org/abs/2005.04411</ee>
<url>db/journals/corr/corr2005.html#abs-2005-04411</url>
</article>
</r>
<r><article publtype="informal" key="journals/corr/abs-2005-04412" mdate="2020-05-14">
<author pid="163/3603">Yiqing Hua</author>
<author pid="42/241">Mor Naaman</author>
<author pid="26/3399">Thomas Ristenpart</author>
<title>Characterizing Twitter Users Who Engage in Adversarial Interactions against Political Candidates.</title>
<year>2020</year>
<volume>abs/2005.04412</volume>
<journal>CoRR</journal>
<ee type="oa">https://arxiv.org/abs/2005.04412</ee>
<url>db/journals/corr/corr2005.html#abs-2005-04412</url>
</article>
</r>
<r><article publtype="informal" key="journals/corr/abs-2005-14341" mdate="2020-06-03">
<author pid="245/6107">Emily Tseng</author>
<author pid="217/9409">Rosanna Bellini</author>
<author pid="128/9352">Nora McDonald</author>
<author pid="231/1859">Matan Danos</author>
<author pid="93/655">Rachel Greenstadt</author>
<author pid="58/4016">Damon McCoy</author>
<author pid="75/11301">Nicola Dell</author>
<author pid="26/3399">Thomas Ristenpart</author>
<title>The Tools and Tactics Used in Intimate Partner Surveillance: An Analysis of Online Infidelity Forums.</title>
<year>2020</year>
<volume>abs/2005.14341</volume>
<journal>CoRR</journal>
<ee type="oa">https://arxiv.org/abs/2005.14341</ee>
<url>db/journals/corr/corr2005.html#abs-2005-14341</url>
</article>
</r>
<r><article publtype="informal" key="journals/corr/abs-2011-05322" mdate="2020-11-12">
<author pid="278/2709">Deepak Sirone Jegan</author>
<author pid="56/4499-23">Liang Wang 0023</author>
<author pid="278/3009">Siddhant Bhagat</author>
<author pid="26/3399">Thomas Ristenpart</author>
<author pid="s/MichaelMSwift">Michael M. Swift</author>
<title>Guarding Serverless Applications with SecLambda.</title>
<year>2020</year>
<volume>abs/2011.05322</volume>
<journal>CoRR</journal>
<ee type="oa">https://arxiv.org/abs/2011.05322</ee>
<url>db/journals/corr/corr2011.html#abs-2011-05322</url>
</article>
</r>
<r><article publtype="informal" key="journals/iacr/LenGR20" mdate="2021-01-04">
<author pid="207/6590">Julia Len</author>
<author pid="139/2372">Paul Grubbs</author>
<author pid="26/3399">Thomas Ristenpart</author>
<title>Partitioning Oracle Attacks.</title>
<pages>1491</pages>
<year>2020</year>
<volume>2020</volume>
<journal>IACR Cryptol. ePrint Arch.</journal>
<ee type="oa">https://eprint.iacr.org/2020/1491</ee>
<url>db/journals/iacr/iacr2020.html#LenGR20</url>
</article>
</r>
<r><article publtype="informal" key="journals/iacr/GrubbsKLBLAR20" mdate="2021-01-04">
<author pid="139/2372">Paul Grubbs</author>
<author pid="162/1936">Anurag Khandelwal</author>
<author pid="172/4062">Marie-Sarah Lacharit&#233;</author>
<author pid="272/7111">Lloyd Brown</author>
<author pid="174/9518">Lucy Li</author>
<author pid="41/5447-1">Rachit Agarwal 0001</author>
<author pid="26/3399">Thomas Ristenpart</author>
<title>PANCAKE: Frequency Smoothing for Encrypted Data Stores.</title>
<pages>1501</pages>
<year>2020</year>
<volume>2020</volume>
<journal>IACR Cryptol. ePrint Arch.</journal>
<ee type="oa">https://eprint.iacr.org/2020/1501</ee>
<url>db/journals/iacr/iacr2020.html#GrubbsKLBLAR20</url>
</article>
</r>
<r><article key="journals/pacmhci/FreedHTGCRD19" mdate="2026-02-01">
<author pid="175/1690">Diana Freed</author>
<author pid="224/2332">Sam Havron</author>
<author orcid="0000-0003-1087-1101" pid="245/6107">Emily Tseng</author>
<author orcid="0009-0006-2422-1256" pid="252/4310">Andrea Gallardo</author>
<author pid="03/9962">Rahul Chatterjee 0001</author>
<author pid="26/3399">Thomas Ristenpart</author>
<author pid="75/11301">Nicola Dell</author>
<title>&#34;Is my phone hacked?&#34; Analyzing Clinical Computer Security Interventions with Survivors of Intimate Partner Violence.</title>
<pages>202:1-202:24</pages>
<year>2019</year>
<volume>3</volume>
<journal>Proc. ACM Hum. Comput. Interact.</journal>
<number>CSCW</number>
<ee>https://doi.org/10.1145/3359304</ee>
<ee>https://www.wikidata.org/entity/Q113180793</ee>
<url>db/journals/pacmhci/pacmhci3.html#FreedHTGCRD19</url>
</article>
</r>
<r><inproceedings key="conf/ccs/TyagiMR19" mdate="2025-01-19">
<author orcid="0000-0002-7671-5681" pid="174/4813">Nirvan Tyagi</author>
<author pid="129/9500">Ian Miers</author>
<author pid="26/3399">Thomas Ristenpart</author>
<title>Traceback for End-to-End Encrypted Messaging.</title>
<pages>413-430</pages>
<year>2019</year>
<booktitle>CCS</booktitle>
<ee>https://doi.org/10.1145/3319535.3354243</ee>
<ee>https://www.wikidata.org/entity/Q130864154</ee>
<crossref>conf/ccs/2019</crossref>
<url>db/conf/ccs/ccs2019.html#TyagiMR19</url>
</inproceedings>
</r>
<r><inproceedings key="conf/ccs/LiPAS0R19" mdate="2020-11-10">
<author pid="174/9518">Lucy Li</author>
<author pid="241/9681">Bijeeta Pal</author>
<author orcid="0000-0002-0180-070X" pid="204/5129">Junade Ali</author>
<author pid="172/5512">Nick Sullivan</author>
<author pid="03/9962">Rahul Chatterjee 0001</author>
<author pid="26/3399">Thomas Ristenpart</author>
<title>Protocols for Checking Compromised Credentials.</title>
<pages>1387-1403</pages>
<year>2019</year>
<booktitle>CCS</booktitle>
<ee>https://doi.org/10.1145/3319535.3354229</ee>
<crossref>conf/ccs/2019</crossref>
<url>db/conf/ccs/ccs2019.html#LiPAS0R19</url>
</inproceedings>
</r>
<r><inproceedings key="conf/crypto/TyagiGLMR19" mdate="2024-10-06">
<author orcid="0000-0002-7671-5681" pid="174/4813">Nirvan Tyagi</author>
<author pid="139/2372">Paul Grubbs</author>
<author pid="207/6590">Julia Len</author>
<author pid="129/9500">Ian Miers</author>
<author pid="26/3399">Thomas Ristenpart</author>
<title>Asymmetric Message Franking: Content Moderation for Metadata-Private End-to-End Encryption.</title>
<pages>222-250</pages>
<year>2019</year>
<booktitle>CRYPTO (3)</booktitle>
<ee>https://doi.org/10.1007/978-3-030-26954-8_8</ee>
<crossref>conf/crypto/2019-3</crossref>
<url>db/conf/crypto/crypto2019-3.html#TyagiGLMR19</url>
</inproceedings>
</r>
<r><inproceedings key="conf/sp/PalD0R19" mdate="2019-09-24">
<author pid="241/9681">Bijeeta Pal</author>
<author pid="05/9543">Tal Daniel</author>
<author pid="03/9962">Rahul Chatterjee 0001</author>
<author pid="26/3399">Thomas Ristenpart</author>
<title>Beyond Credential Stuffing: Password Similarity Models Using Neural Networks.</title>
<pages>417-434</pages>
<year>2019</year>
<booktitle>IEEE Symposium on Security and Privacy</booktitle>
<ee>https://doi.org/10.1109/SP.2019.00056</ee>
<crossref>conf/sp/2019</crossref>
<url>db/conf/sp/sp2019.html#PalD0R19</url>
</inproceedings>
</r>
<r><inproceedings key="conf/sp/WangAPRS19" mdate="2023-06-26">
<author pid="56/4499-23">Liang Wang 0023</author>
<author orcid="0000-0002-0846-9773" pid="25/7423">Gilad Asharov</author>
<author orcid="0000-0001-7440-5690" pid="p/RPass">Rafael Pass</author>
<author pid="26/3399">Thomas Ristenpart</author>
<author pid="s/AShelat">Abhi Shelat</author>
<title>Blind Certificate Authorities.</title>
<pages>1015-1032</pages>
<year>2019</year>
<booktitle>IEEE Symposium on Security and Privacy</booktitle>
<ee>https://doi.org/10.1109/SP.2019.00007</ee>
<crossref>conf/sp/2019</crossref>
<url>db/conf/sp/sp2019.html#WangAPRS19</url>
</inproceedings>
</r>
<r><inproceedings key="conf/uss/HavronF0MDR19" mdate="2021-02-01">
<author pid="224/2332">Sam Havron</author>
<author pid="175/1690">Diana Freed</author>
<author pid="03/9962">Rahul Chatterjee 0001</author>
<author pid="58/4016">Damon McCoy</author>
<author pid="75/11301">Nicola Dell</author>
<author pid="26/3399">Thomas Ristenpart</author>
<title>Clinical Computer Security for Victims of Intimate Partner Violence.</title>
<pages>105-122</pages>
<year>2019</year>
<booktitle>USENIX Security Symposium</booktitle>
<ee type="oa">https://www.usenix.org/conference/usenixsecurity19/presentation/havron</ee>
<crossref>conf/uss/2019</crossref>
<url>db/conf/uss/uss2019.html#HavronF0MDR19</url>
</inproceedings>
</r>
<r><article publtype="informal" key="journals/corr/abs-1905-13737" mdate="2019-06-03">
<author pid="174/9518">Lucy Li</author>
<author pid="241/9681">Bijeeta Pal</author>
<author pid="204/5129">Junade Ali</author>
<author pid="172/5512">Nick Sullivan</author>
<author pid="03/9962">Rahul Chatterjee 0001</author>
<author pid="26/3399">Thomas Ristenpart</author>
<title>Protocols for Checking Compromised Credentials.</title>
<year>2019</year>
<volume>abs/1905.13737</volume>
<journal>CoRR</journal>
<ee type="oa">http://arxiv.org/abs/1905.13737</ee>
<url>db/journals/corr/corr1905.html#abs-1905-13737</url>
</article>
</r>
<r><article publtype="informal" key="journals/iacr/DodisGRW19" mdate="2020-05-11">
<author pid="d/YevgeniyDodis">Yevgeniy Dodis</author>
<author pid="139/2372">Paul Grubbs</author>
<author pid="26/3399">Thomas Ristenpart</author>
<author pid="181/1576">Joanne Woodage</author>
<title>Fast Message Franking: From Invisible Salamanders to Encryptment.</title>
<pages>16</pages>
<year>2019</year>
<volume>2019</volume>
<journal>IACR Cryptol. ePrint Arch.</journal>
<ee type="oa">https://eprint.iacr.org/2019/016</ee>
<url>db/journals/iacr/iacr2019.html#DodisGRW19</url>
</article>
</r>
<r><article publtype="informal" key="journals/iacr/TyagiGLMR19" mdate="2020-05-11">
<author pid="174/4813">Nirvan Tyagi</author>
<author pid="139/2372">Paul Grubbs</author>
<author pid="207/6590">Julia Len</author>
<author pid="129/9500">Ian Miers</author>
<author pid="26/3399">Thomas Ristenpart</author>
<title>Asymmetric Message Franking: Content Moderation for Metadata-Private End-to-End Encryption.</title>
<pages>565</pages>
<year>2019</year>
<volume>2019</volume>
<journal>IACR Cryptol. ePrint Arch.</journal>
<ee type="oa">https://eprint.iacr.org/2019/565</ee>
<url>db/journals/iacr/iacr2019.html#TyagiGLMR19</url>
</article>
</r>
<r><article publtype="informal" key="journals/iacr/TyagiMR19" mdate="2020-05-11">
<author pid="174/4813">Nirvan Tyagi</author>
<author pid="129/9500">Ian Miers</author>
<author pid="26/3399">Thomas Ristenpart</author>
<title>Traceback for End-to-End Encrypted Messaging.</title>
<pages>981</pages>
<year>2019</year>
<volume>2019</volume>
<journal>IACR Cryptol. ePrint Arch.</journal>
<ee type="oa">https://eprint.iacr.org/2019/981</ee>
<url>db/journals/iacr/iacr2019.html#TyagiMR19</url>
</article>
</r>
<r><article key="journals/pvldb/BindschaedlerGC18" mdate="2024-05-07">
<author orcid="0000-0002-3066-7354" pid="117/2526">Vincent Bindschaedler</author>
<author pid="139/2372">Paul Grubbs</author>
<author pid="68/158">David Cash</author>
<author pid="26/3399">Thomas Ristenpart</author>
<author pid="46/6275">Vitaly Shmatikov</author>
<title>The Tao of Inference in Privacy-Protected Databases.</title>
<pages>1715-1728</pages>
<year>2018</year>
<volume>11</volume>
<journal>Proc. VLDB Endow.</journal>
<number>11</number>
<ee type="oa">http://www.vldb.org/pvldb/vol11/p1715-bindschaedler.pdf</ee>
<ee>https://doi.org/10.14778/3236187.3236217</ee>
<url>db/journals/pvldb/pvldb11.html#BindschaedlerGC18</url>
</article>
</r>
<r><inproceedings key="conf/chi/FreedPMLRD18" mdate="2020-06-15">
<author pid="175/1690">Diana Freed</author>
<author pid="212/2685">Jackeline Palmer</author>
<author pid="212/2989">Diana Elizabeth Minchala</author>
<author orcid="0000-0003-3806-9161" pid="16/10897">Karen Levy</author>
<author pid="26/3399">Thomas Ristenpart</author>
<author pid="75/11301">Nicola Dell</author>
<title>&#34;A Stalker's Paradise&#34;: How Intimate Partner Abusers Exploit Technology.</title>
<pages>667</pages>
<year>2018</year>
<booktitle>CHI</booktitle>
<ee>https://doi.org/10.1145/3173574.3174241</ee>
<crossref>conf/chi/2018</crossref>
<url>db/conf/chi/chi2018.html#FreedPMLRD18</url>
</inproceedings>
</r>
<r><inproceedings key="conf/crypto/DodisGRW18" mdate="2024-05-07">
<author pid="d/YevgeniyDodis">Yevgeniy Dodis</author>
<author pid="139/2372">Paul Grubbs</author>
<author orcid="0000-0002-8642-9558" pid="26/3399">Thomas Ristenpart</author>
<author pid="181/1576">Joanne Woodage</author>
<title>Fast Message Franking: From Invisible Salamanders to Encryptment.</title>
<pages>155-186</pages>
<year>2018</year>
<booktitle>CRYPTO (1)</booktitle>
<ee>https://doi.org/10.1007/978-3-319-96884-1_6</ee>
<crossref>conf/crypto/2018-1</crossref>
<url>db/conf/crypto/crypto2018-1.html#DodisGRW18</url>
</inproceedings>
</r>
<r><inproceedings key="conf/sp/ChatterjeeDOHPF18" mdate="2023-03-24">
<author pid="03/9962">Rahul Chatterjee 0001</author>
<author pid="204/3432">Periwinkle Doerfler</author>
<author pid="224/2323">Hadas Orgad</author>
<author pid="224/2332">Sam Havron</author>
<author pid="212/2685">Jackeline Palmer</author>
<author pid="175/1690">Diana Freed</author>
<author orcid="0000-0003-3806-9161" pid="16/10897">Karen Levy</author>
<author pid="75/11301">Nicola Dell</author>
<author pid="58/4016">Damon McCoy</author>
<author pid="26/3399">Thomas Ristenpart</author>
<title>The Spyware Used in Intimate Partner Violence.</title>
<pages>441-458</pages>
<year>2018</year>
<booktitle>IEEE Symposium on Security and Privacy</booktitle>
<ee>https://doi.org/10.1109/SP.2018.00061</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/SP.2018.00061</ee>
<crossref>conf/sp/2018</crossref>
<url>db/conf/sp/sp2018.html#ChatterjeeDOHPF18</url>
</inproceedings>
</r>
<r><inproceedings key="conf/usenix/WangLZRS18" mdate="2025-09-14">
<author pid="56/4499-23">Liang Wang 0023</author>
<author pid="157/4437-4">Mengyuan Li 0004</author>
<author pid="77/3503">Yinqian Zhang</author>
<author pid="26/3399">Thomas Ristenpart</author>
<author pid="s/MichaelMSwift">Michael M. Swift</author>
<title>Peeking Behind the Curtains of Serverless Platforms.</title>
<pages>133-146</pages>
<year>2018</year>
<booktitle>USENIX ATC</booktitle>
<ee type="oa">https://www.usenix.org/conference/atc18/presentation/wang-liang</ee>
<crossref>conf/usenix/2018</crossref>
<url>db/conf/usenix/usenix2018.html#WangLZRS18</url>
</inproceedings>
</r>
<r><inproceedings key="conf/uss/TyagiMRM18" mdate="2024-10-06">
<author orcid="0000-0002-7671-5681" pid="174/4813">Nirvan Tyagi</author>
<author pid="180/5609">Muhammad Haris Mughees</author>
<author pid="26/3399">Thomas Ristenpart</author>
<author pid="129/9500">Ian Miers</author>
<title>BurnBox: Self-Revocable Encryption in a World Of Compelled Access.</title>
<pages>445-461</pages>
<year>2018</year>
<booktitle>USENIX Security Symposium</booktitle>
<ee type="oa">https://www.usenix.org/conference/usenixsecurity18/presentation/tyagi</ee>
<crossref>conf/uss/2018</crossref>
<url>db/conf/uss/uss2018.html#TyagiMRM18</url>
</inproceedings>
</r>
<r><article publtype="informal" key="journals/corr/abs-1802-03367" mdate="2018-08-13">
<author pid="41/11468">Jeffrey Knockel</author>
<author pid="26/3399">Thomas Ristenpart</author>
<author pid="c/JRCrandall">Jedidiah R. Crandall</author>
<title>When Textbook RSA is Used to Protect the Privacy of Hundreds of Millions of Users.</title>
<year>2018</year>
<volume>abs/1802.03367</volume>
<journal>CoRR</journal>
<ee type="oa">http://arxiv.org/abs/1802.03367</ee>
<url>db/journals/corr/corr1802.html#abs-1802-03367</url>
</article>
</r>
<r><article publtype="informal" key="journals/iacr/TyagiMRM18" mdate="2020-05-11">
<author pid="174/4813">Nirvan Tyagi</author>
<author pid="180/5609">Muhammad Haris Mughees</author>
<author pid="26/3399">Thomas Ristenpart</author>
<author pid="129/9500">Ian Miers</author>
<title>BurnBox: Self-Revocable Encryption in a World Of Compelled Access.</title>
<pages>638</pages>
<year>2018</year>
<volume>2018</volume>
<journal>IACR Cryptol. ePrint Arch.</journal>
<ee type="oa">https://eprint.iacr.org/2018/638</ee>
<url>db/journals/iacr/iacr2018.html#TyagiMRM18</url>
</article>
</r>
<r><article publtype="informal" key="journals/iacr/WangAPRS18" mdate="2020-10-20">
<author pid="56/4499-23">Liang Wang 0023</author>
<author pid="25/7423">Gilad Asharov</author>
<author pid="p/RPass">Rafael Pass</author>
<author pid="26/3399">Thomas Ristenpart</author>
<author pid="s/AShelat">Abhi Shelat</author>
<title>Blind Certificate Authorities.</title>
<pages>1022</pages>
<year>2018</year>
<volume>2018</volume>
<journal>IACR Cryptol. ePrint Arch.</journal>
<ee type="oa">https://eprint.iacr.org/2018/1022</ee>
<url>db/journals/iacr/iacr2018.html#WangAPRS18</url>
</article>
</r>
<r><article key="journals/ieeesp/AikatACJRRSS17" mdate="2024-10-06">
<author pid="22/149">Jay Aikat</author>
<author pid="a/AdityaAkella">Aditya Akella</author>
<author orcid="0000-0001-8275-0830" pid="c/JSChase">Jeffrey S. Chase</author>
<author pid="j/AriJuels">Ari Juels</author>
<author pid="r/MichaelKReiter">Michael K. Reiter</author>
<author pid="26/3399">Thomas Ristenpart</author>
<author pid="45/4044">Vyas Sekar</author>
<author pid="s/MichaelMSwift">Michael M. Swift</author>
<title>Rethinking Security in the Era of Cloud Computing.</title>
<pages>60-69</pages>
<year>2017</year>
<volume>15</volume>
<journal>IEEE Secur. Priv.</journal>
<number>3</number>
<ee>https://doi.org/10.1109/MSP.2017.80</ee>
<ee>http://doi.ieeecomputersociety.org/10.1109/MSP.2017.80</ee>
<url>db/journals/ieeesp/ieeesp15.html#AikatACJRRSS17</url>
</article>
</r>
<r><article key="journals/pacmhci/FreedPMLRD17" mdate="2020-08-25">
<author pid="175/1690">Diana Freed</author>
<author pid="212/2685">Jackeline Palmer</author>
<author pid="212/2989">Diana Elizabeth Minchala</author>
<author orcid="0000-0003-3806-9161" pid="16/10897">Karen Levy</author>
<author pid="26/3399">Thomas Ristenpart</author>
<author pid="75/11301">Nicola Dell</author>
<title>Digital Technologies and Intimate Partner Violence: A Qualitative Analysis with Multiple Stakeholders.</title>
<pages>46:1-46:22</pages>
<year>2017</year>
<volume>1</volume>
<journal>Proc. ACM Hum. Comput. Interact.</journal>
<number>CSCW</number>
<ee>https://doi.org/10.1145/3134681</ee>
<url>db/journals/pacmhci/pacmhci1.html#FreedPMLRD17</url>
</article>
</r>
<r><inproceedings key="conf/ccs/ChatterjeeWPCR17" mdate="2025-01-19">
<author pid="03/9962">Rahul Chatterjee 0001</author>
<author pid="181/1576">Joanne Woodage</author>
<author pid="207/6584">Yuval Pnueli</author>
<author pid="138/3391">Anusha Chowdhury</author>
<author pid="26/3399">Thomas Ristenpart</author>
<title>The TypTop System: Personalized Typo-Tolerant Password Checking.</title>
<pages>329-346</pages>
<year>2017</year>
<booktitle>CCS</booktitle>
<ee>https://doi.org/10.1145/3133956.3134000</ee>
<ee>https://www.wikidata.org/entity/Q130885554</ee>
<crossref>conf/ccs/2017</crossref>
<url>db/conf/ccs/ccs2017.html#ChatterjeeWPCR17</url>
</inproceedings>
</r>
<r><inproceedings key="conf/ccs/SongRS17" mdate="2020-11-10">
<author pid="186/8335">Congzheng Song</author>
<author pid="26/3399">Thomas Ristenpart</author>
<author pid="46/6275">Vitaly Shmatikov</author>
<title>Machine Learning Models that Remember Too Much.</title>
<pages>587-601</pages>
<year>2017</year>
<booktitle>CCS</booktitle>
<ee>https://doi.org/10.1145/3133956.3134077</ee>
<crossref>conf/ccs/2017</crossref>
<url>db/conf/ccs/ccs2017.html#SongRS17</url>
</inproceedings>
</r>
<r><inproceedings key="conf/ccs/PustogarovRS17" mdate="2018-11-06">
<author pid="47/8436">Ivan Pustogarov</author>
<author pid="26/3399">Thomas Ristenpart</author>
<author pid="46/6275">Vitaly Shmatikov</author>
<title>Using Program Analysis to Synthesize Sensor Spoofing Attacks.</title>
<pages>757-770</pages>
<year>2017</year>
<booktitle>AsiaCCS</booktitle>
<ee>https://doi.org/10.1145/3052973.3053038</ee>
<crossref>conf/ccs/2017asia</crossref>
<url>db/conf/ccs/asiaccs2017.html#PustogarovRS17</url>
</inproceedings>
</r>
<r><inproceedings key="conf/crypto/GrubbsLR17" mdate="2024-05-07">
<author pid="139/2372">Paul Grubbs</author>
<author pid="96/939">Jiahui Lu</author>
<author orcid="0000-0002-8642-9558" pid="26/3399">Thomas Ristenpart</author>
<title>Message Franking via Committing Authenticated Encryption.</title>
<pages>66-97</pages>
<year>2017</year>
<booktitle>CRYPTO (3)</booktitle>
<ee>https://doi.org/10.1007/978-3-319-63697-9_3</ee>
<crossref>conf/crypto/2017-3</crossref>
<url>db/conf/crypto/crypto2017-3.html#GrubbsLR17</url>
</inproceedings>
</r>
<r><inproceedings key="conf/crypto/EverspaughPRS17" mdate="2017-08-14">
<author pid="26/4437">Adam Everspaugh</author>
<author pid="39/780">Kenneth G. Paterson</author>
<author pid="26/3399">Thomas Ristenpart</author>
<author pid="165/8373">Samuel Scott</author>
<title>Key Rotation for Authenticated Encryption.</title>
<pages>98-129</pages>
<year>2017</year>
<booktitle>CRYPTO (3)</booktitle>
<ee>https://doi.org/10.1007/978-3-319-63697-9_4</ee>
<crossref>conf/crypto/2017-3</crossref>
<url>db/conf/crypto/crypto2017-3.html#EverspaughPRS17</url>
</inproceedings>
</r>
<r><inproceedings key="conf/crypto/WoodageCDJR17" mdate="2018-12-13">
<author pid="181/1576">Joanne Woodage</author>
<author pid="03/9962">Rahul Chatterjee 0001</author>
<author pid="d/YevgeniyDodis">Yevgeniy Dodis</author>
<author pid="j/AriJuels">Ari Juels</author>
<author pid="26/3399">Thomas Ristenpart</author>
<title>A New Distribution-Sensitive Secure Sketch and Popularity-Proportional Hashing.</title>
<pages>682-710</pages>
<year>2017</year>
<booktitle>CRYPTO (3)</booktitle>
<ee>https://doi.org/10.1007/978-3-319-63697-9_23</ee>
<crossref>conf/crypto/2017-3</crossref>
<url>db/conf/crypto/crypto2017-3.html#WoodageCDJR17</url>
</inproceedings>
</r>
<r><inproceedings key="conf/eurocrypt/GrubbsRY17" mdate="2023-06-26">
<author pid="139/2372">Paul Grubbs</author>
<author pid="26/3399">Thomas Ristenpart</author>
<author orcid="0000-0003-0401-4197" pid="90/10901">Yuval Yarom</author>
<title>Modifying an Enciphering Scheme After Deployment.</title>
<pages>499-527</pages>
<year>2017</year>
<booktitle>EUROCRYPT (2)</booktitle>
<ee>https://doi.org/10.1007/978-3-319-56614-6_17</ee>
<crossref>conf/eurocrypt/2017-2</crossref>
<url>db/conf/eurocrypt/eurocrypt2017-2.html#GrubbsRY17</url>
</inproceedings>
</r>
<r><inproceedings key="conf/hotos/GrubbsRS17" mdate="2025-01-19">
<author pid="139/2372">Paul Grubbs</author>
<author pid="26/3399">Thomas Ristenpart</author>
<author pid="46/6275">Vitaly Shmatikov</author>
<title>Why Your Encrypted Database Is Not Secure.</title>
<pages>162-168</pages>
<year>2017</year>
<booktitle>HotOS</booktitle>
<ee>https://doi.org/10.1145/3102980.3103007</ee>
<ee>https://www.wikidata.org/entity/Q130858054</ee>
<crossref>conf/hotos/2017</crossref>
<url>db/conf/hotos/hotos2017.html#GrubbsRS17</url>
</inproceedings>
</r>
<r><inproceedings key="conf/sp/GrubbsSB0R17" mdate="2024-05-07">
<author pid="139/2372">Paul Grubbs</author>
<author pid="187/5561">Kevin Sekniqi</author>
<author orcid="0000-0002-3066-7354" pid="117/2526">Vincent Bindschaedler</author>
<author pid="120/9715-1">Muhammad Naveed 0001</author>
<author pid="26/3399">Thomas Ristenpart</author>
<title>Leakage-Abuse Attacks against Order-Revealing Encryption.</title>
<pages>655-672</pages>
<year>2017</year>
<booktitle>IEEE Symposium on Security and Privacy</booktitle>
<ee>https://doi.org/10.1109/SP.2017.44</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/SP.2017.44</ee>
<crossref>conf/sp/2017</crossref>
<url>db/conf/sp/sp2017.html#GrubbsSB0R17</url>
</inproceedings>
</r>
<r><inproceedings key="conf/sp/WangGLBCR17" mdate="2024-05-07">
<author pid="56/4499-23">Liang Wang 0023</author>
<author pid="139/2372">Paul Grubbs</author>
<author pid="96/939">Jiahui Lu</author>
<author orcid="0000-0002-3066-7354" pid="117/2526">Vincent Bindschaedler</author>
<author pid="68/158">David Cash</author>
<author pid="26/3399">Thomas Ristenpart</author>
<title>Side-Channel Attacks on Shared Search Indexes.</title>
<pages>673-692</pages>
<year>2017</year>
<booktitle>IEEE Symposium on Security and Privacy</booktitle>
<ee>https://doi.org/10.1109/SP.2017.50</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/SP.2017.50</ee>
<crossref>conf/sp/2017</crossref>
<url>db/conf/sp/sp2017.html#WangGLBCR17</url>
</inproceedings>
</r>
<r><proceedings key="conf/uss/2017" mdate="2021-02-01">
<editor pid="k/EnginKirda">Engin Kirda</editor>
<editor pid="26/3399">Thomas Ristenpart</editor>
<title>26th USENIX Security Symposium, USENIX Security 2017, Vancouver, BC, Canada, August 16-18, 2017.</title>
<booktitle>USENIX Security Symposium</booktitle>
<publisher>USENIX Association</publisher>
<year>2017</year>
<ee type="oa">https://www.usenix.org/conference/usenixsecurity17</ee>
<url>db/conf/uss/uss2017.html</url>
</proceedings>
</r>
<r><article publtype="informal" key="journals/corr/abs-1709-07886" mdate="2018-08-13">
<author pid="186/8335">Congzheng Song</author>
<author pid="26/3399">Thomas Ristenpart</author>
<author pid="46/6275">Vitaly Shmatikov</author>
<title>Machine Learning Models that Remember Too Much.</title>
<year>2017</year>
<volume>abs/1709.07886</volume>
<journal>CoRR</journal>
<ee type="oa">http://arxiv.org/abs/1709.07886</ee>
<url>db/journals/corr/corr1709.html#abs-1709-07886</url>
</article>
</r>
<r><article publtype="informal" key="journals/iacr/GrubbsRY17" mdate="2020-05-11">
<author pid="139/2372">Paul Grubbs</author>
<author pid="26/3399">Thomas Ristenpart</author>
<author pid="90/10901">Yuval Yarom</author>
<title>Modifying an Enciphering Scheme after Deployment.</title>
<pages>137</pages>
<year>2017</year>
<volume>2017</volume>
<journal>IACR Cryptol. ePrint Arch.</journal>
<ee type="oa">http://eprint.iacr.org/2017/137</ee>
<url>db/journals/iacr/iacr2017.html#GrubbsRY17</url>
</article>
</r>
<r><article publtype="informal" key="journals/iacr/GrubbsRS17" mdate="2020-05-11">
<author pid="139/2372">Paul Grubbs</author>
<author pid="26/3399">Thomas Ristenpart</author>
<author pid="46/6275">Vitaly Shmatikov</author>
<title>Why Your Encrypted Database Is Not Secure.</title>
<pages>468</pages>
<year>2017</year>
<volume>2017</volume>
<journal>IACR Cryptol. ePrint Arch.</journal>
<ee type="oa">http://eprint.iacr.org/2017/468</ee>
<url>db/journals/iacr/iacr2017.html#GrubbsRS17</url>
</article>
</r>
<r><article publtype="informal" key="journals/iacr/EverspaughPRS17" mdate="2020-05-11">
<author pid="26/4437">Adam Everspaugh</author>
<author pid="39/780">Kenneth G. Paterson</author>
<author pid="26/3399">Thomas Ristenpart</author>
<author pid="165/8373">Samuel Scott</author>
<title>Key Rotation for Authenticated Encryption.</title>
<pages>527</pages>
<year>2017</year>
<volume>2017</volume>
<journal>IACR Cryptol. ePrint Arch.</journal>
<ee type="oa">http://eprint.iacr.org/2017/527</ee>
<url>db/journals/iacr/iacr2017.html#EverspaughPRS17</url>
</article>
</r>
<r><article publtype="informal" key="journals/iacr/WoodageCDJR17" mdate="2020-05-11">
<author pid="181/1576">Joanne Woodage</author>
<author pid="03/9962">Rahul Chatterjee 0001</author>
<author pid="d/YevgeniyDodis">Yevgeniy Dodis</author>
<author pid="j/AriJuels">Ari Juels</author>
<author pid="26/3399">Thomas Ristenpart</author>
<title>A New Distribution Sensitive Secure Sketch and a Comparison Between Approaches to Typo-Tolerant Authentication.</title>
<pages>542</pages>
<year>2017</year>
<volume>2017</volume>
<journal>IACR Cryptol. ePrint Arch.</journal>
<ee type="oa">http://eprint.iacr.org/2017/542</ee>
<url>db/journals/iacr/iacr2017.html#WoodageCDJR17</url>
</article>
</r>
<r><article publtype="informal" key="journals/iacr/GrubbsLR17" mdate="2020-05-11">
<author pid="139/2372">Paul Grubbs</author>
<author pid="96/939">Jiahui Lu</author>
<author pid="26/3399">Thomas Ristenpart</author>
<title>Message Franking via Committing Authenticated Encryption.</title>
<pages>664</pages>
<year>2017</year>
<volume>2017</volume>
<journal>IACR Cryptol. ePrint Arch.</journal>
<ee type="oa">http://eprint.iacr.org/2017/664</ee>
<url>db/journals/iacr/iacr2017.html#GrubbsLR17</url>
</article>
</r>
<r><article publtype="informal" key="journals/iacr/ChatterjeeWPCR17" mdate="2020-05-11">
<author pid="03/9962">Rahul Chatterjee 0001</author>
<author pid="181/1576">Joanne Woodage</author>
<author pid="207/6584">Yuval Pnueli</author>
<author pid="138/3391">Anusha Chowdhury</author>
<author pid="26/3399">Thomas Ristenpart</author>
<title>The TypTop System: Personalized Typo-Tolerant Password Checking.</title>
<pages>810</pages>
<year>2017</year>
<volume>2017</volume>
<journal>IACR Cryptol. ePrint Arch.</journal>
<ee type="oa">http://eprint.iacr.org/2017/810</ee>
<url>db/journals/iacr/iacr2017.html#ChatterjeeWPCR17</url>
</article>
</r>
<r><article publtype="informal" key="journals/iacr/BindschaedlerGC17" mdate="2020-05-11">
<author pid="117/2526">Vincent Bindschaedler</author>
<author pid="139/2372">Paul Grubbs</author>
<author pid="68/158">David Cash</author>
<author pid="26/3399">Thomas Ristenpart</author>
<author pid="46/6275">Vitaly Shmatikov</author>
<title>The Tao of Inference in Privacy-Protected Databases.</title>
<pages>1078</pages>
<year>2017</year>
<volume>2017</volume>
<journal>IACR Cryptol. ePrint Arch.</journal>
<ee type="oa">http://eprint.iacr.org/2017/1078</ee>
<url>db/journals/iacr/iacr2017.html#BindschaedlerGC17</url>
</article>
</r>
<r><article key="journals/ieeesp/DixonRS16" mdate="2020-03-15">
<author pid="39/6853">Lucas Dixon</author>
<author pid="26/3399">Thomas Ristenpart</author>
<author pid="s/ThomasShrimpton">Thomas Shrimpton</author>
<title>Network Traffic Obfuscation and Automated Internet Censorship.</title>
<pages>43-53</pages>
<year>2016</year>
<volume>14</volume>
<journal>IEEE Secur. Priv.</journal>
<number>6</number>
<ee>https://doi.org/10.1109/MSP.2016.121</ee>
<ee>http://doi.ieeecomputersociety.org/10.1109/MSP.2016.121</ee>
<ee>https://www.wikidata.org/entity/Q61440798</ee>
<url>db/journals/ieeesp/ieeesp14.html#DixonRS16</url>
</article>
</r>
<r><inproceedings key="conf/ccs/GrubbsMNRS16" mdate="2025-01-19">
<author pid="139/2372">Paul Grubbs</author>
<author pid="134/8738">Richard McPherson</author>
<author pid="120/9715-1">Muhammad Naveed 0001</author>
<author pid="26/3399">Thomas Ristenpart</author>
<author pid="46/6275">Vitaly Shmatikov</author>
<title>Breaking Web Applications Built On Top of Encrypted Data.</title>
<pages>1353-1364</pages>
<year>2016</year>
<booktitle>CCS</booktitle>
<ee>https://doi.org/10.1145/2976749.2978351</ee>
<ee>https://www.wikidata.org/entity/Q130867122</ee>
<crossref>conf/ccs/2016</crossref>
<url>db/conf/ccs/ccs2016.html#GrubbsMNRS16</url>
</inproceedings>
</r>
<r><inproceedings key="conf/cloud/ZhaiYCRS16" mdate="2024-10-06">
<author pid="44/6741">Yan Zhai</author>
<author pid="185/9393">Lichao Yin</author>
<author orcid="0000-0001-8275-0830" pid="c/JSChase">Jeffrey S. Chase</author>
<author pid="26/3399">Thomas Ristenpart</author>
<author pid="s/MichaelMSwift">Michael M. Swift</author>
<title>CQSTR: Securing Cross-Tenant Applications with Cloud Containers.</title>
<pages>223-236</pages>
<year>2016</year>
<booktitle>SoCC</booktitle>
<ee>https://doi.org/10.1145/2987550.2987558</ee>
<crossref>conf/cloud/2016</crossref>
<url>db/conf/cloud/socc2016.html#ZhaiYCRS16</url>
</inproceedings>
</r>
<r><inproceedings key="conf/eurocrypt/JaegerRT16" mdate="2025-03-03">
<author orcid="0000-0002-4934-3405" pid="153/9914">Joseph Jaeger</author>
<author pid="26/3399">Thomas Ristenpart</author>
<author orcid="0000-0003-1113-6352" pid="17/2212-5">Qiang Tang 0005</author>
<title>Honey Encryption Beyond Message Recovery Security.</title>
<pages>758-788</pages>
<year>2016</year>
<booktitle>EUROCRYPT (1)</booktitle>
<ee>https://doi.org/10.1007/978-3-662-49890-3_29</ee>
<crossref>conf/eurocrypt/2016-1</crossref>
<url>db/conf/eurocrypt/eurocrypt2016-1.html#JaegerRT16</url>
</inproceedings>
</r>
<r><inproceedings key="conf/sp/ChatterjeeAAJR16" mdate="2023-03-24">
<author pid="03/9962">Rahul Chatterjee 0001</author>
<author pid="184/6066">Anish Athayle</author>
<author pid="12/8302">Devdatta Akhawe</author>
<author pid="j/AriJuels">Ari Juels</author>
<author pid="26/3399">Thomas Ristenpart</author>
<title>pASSWORD tYPOS and How to Correct Them Securely.</title>
<pages>799-818</pages>
<year>2016</year>
<booktitle>IEEE Symposium on Security and Privacy</booktitle>
<ee>https://doi.org/10.1109/SP.2016.53</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/SP.2016.53</ee>
<crossref>conf/sp/2016</crossref>
<url>db/conf/sp/sp2016.html#ChatterjeeAAJR16</url>
</inproceedings>
</r>
<r><inproceedings key="conf/uss/TramerZJRR16" mdate="2022-10-02">
<author orcid="0000-0001-8703-8762" pid="158/7224">Florian Tram&#232;r</author>
<author pid="21/3626-22">Fan Zhang 0022</author>
<author pid="j/AriJuels">Ari Juels</author>
<author pid="r/MichaelKReiter">Michael K. Reiter</author>
<author pid="26/3399">Thomas Ristenpart</author>
<title>Stealing Machine Learning Models via Prediction APIs.</title>
<pages>601-618</pages>
<year>2016</year>
<booktitle>USENIX Security Symposium</booktitle>
<ee type="oa">https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/tramer</ee>
<crossref>conf/uss/2016</crossref>
<url>db/conf/uss/uss2016.html#TramerZJRR16</url>
</inproceedings>
</r>
<r><inproceedings key="conf/woot/DavidsonWJSR16" mdate="2021-02-01">
<author pid="37/5586">Drew Davidson</author>
<author pid="72/4250">Hao Wu</author>
<author pid="150/5888">Robert Jellinek</author>
<author pid="26/1810">Vikas Singh</author>
<author pid="26/3399">Thomas Ristenpart</author>
<title>Controlling UAVs with Sensor Input Spoofing Attacks.</title>
<year>2016</year>
<booktitle>WOOT</booktitle>
<ee type="oa">https://www.usenix.org/conference/woot16/workshop-program/presentation/davidson</ee>
<crossref>conf/woot/2016</crossref>
<url>db/conf/woot/woot2016.html#DavidsonWJSR16</url>
</inproceedings>
</r>
<r><article publtype="informal" key="journals/corr/DixonRS16" mdate="2018-08-13">
<author pid="39/6853">Lucas Dixon</author>
<author pid="26/3399">Thomas Ristenpart</author>
<author pid="s/ThomasShrimpton">Thomas Shrimpton</author>
<title>Network Traffic Obfuscation and Automated Internet Censorship.</title>
<year>2016</year>
<volume>abs/1605.04044</volume>
<journal>CoRR</journal>
<ee type="oa">http://arxiv.org/abs/1605.04044</ee>
<url>db/journals/corr/corr1605.html#DixonRS16</url>
</article>
</r>
<r><article publtype="informal" key="journals/corr/TramerZJRR16" mdate="2019-02-13">
<author pid="158/7224">Florian Tram&#232;r</author>
<author pid="21/3626-22">Fan Zhang 0022</author>
<author pid="j/AriJuels">Ari Juels</author>
<author pid="r/MichaelKReiter">Michael K. Reiter</author>
<author pid="26/3399">Thomas Ristenpart</author>
<title>Stealing Machine Learning Models via Prediction APIs.</title>
<year>2016</year>
<volume>abs/1609.02943</volume>
<journal>CoRR</journal>
<ee type="oa">http://arxiv.org/abs/1609.02943</ee>
<url>db/journals/corr/corr1609.html#TramerZJRR16</url>
</article>
</r>
<r><article publtype="informal" key="journals/iacr/JaegerRT16" mdate="2020-05-11">
<author pid="153/9914">Joseph Jaeger</author>
<author pid="26/3399">Thomas Ristenpart</author>
<author pid="17/2212-5">Qiang Tang 0005</author>
<title>Honey Encryption Beyond Message Recovery Security.</title>
<pages>174</pages>
<year>2016</year>
<volume>2016</volume>
<journal>IACR Cryptol. ePrint Arch.</journal>
<ee type="oa">http://eprint.iacr.org/2016/174</ee>
<url>db/journals/iacr/iacr2016.html#JaegerRT16</url>
</article>
</r>
<r><article publtype="informal" key="journals/iacr/DodisGGJR16" mdate="2020-05-11">
<author pid="d/YevgeniyDodis">Yevgeniy Dodis</author>
<author pid="115/4391">Chaya Ganesh</author>
<author pid="31/11062">Alexander Golovnev</author>
<author pid="j/AriJuels">Ari Juels</author>
<author pid="26/3399">Thomas Ristenpart</author>
<title>A Formal Treatment of Backdoored Pseudorandom Generators.</title>
<pages>306</pages>
<year>2016</year>
<volume>2016</volume>
<journal>IACR Cryptol. ePrint Arch.</journal>
<ee type="oa">http://eprint.iacr.org/2016/306</ee>
<url>db/journals/iacr/iacr2016.html#DodisGGJR16</url>
</article>
</r>
<r><article publtype="informal" key="journals/iacr/CashGPR16" mdate="2020-05-11">
<author pid="68/158">David Cash</author>
<author pid="139/2372">Paul Grubbs</author>
<author pid="130/6989">Jason Perry</author>
<author pid="26/3399">Thomas Ristenpart</author>
<title>Leakage-Abuse Attacks Against Searchable Encryption.</title>
<pages>718</pages>
<year>2016</year>
<volume>2016</volume>
<journal>IACR Cryptol. ePrint Arch.</journal>
<ee type="oa">http://eprint.iacr.org/2016/718</ee>
<url>db/journals/iacr/iacr2016.html#CashGPR16</url>
</article>
</r>
<r><article publtype="informal" key="journals/iacr/GrubbsSB0R16" mdate="2020-05-11">
<author pid="139/2372">Paul Grubbs</author>
<author pid="187/5561">Kevin Sekniqi</author>
<author pid="117/2526">Vincent Bindschaedler</author>
<author pid="120/9715-1">Muhammad Naveed 0001</author>
<author pid="26/3399">Thomas Ristenpart</author>
<title>Leakage-Abuse Attacks against Order-Revealing Encryption.</title>
<pages>895</pages>
<year>2016</year>
<volume>2016</volume>
<journal>IACR Cryptol. ePrint Arch.</journal>
<ee type="oa">http://eprint.iacr.org/2016/895</ee>
<url>db/journals/iacr/iacr2016.html#GrubbsSB0R16</url>
</article>
</r>
<r><article publtype="informal" key="journals/iacr/GrubbsMNRS16" mdate="2020-05-11">
<author pid="139/2372">Paul Grubbs</author>
<author pid="134/8738">Richard McPherson</author>
<author pid="120/9715-1">Muhammad Naveed 0001</author>
<author pid="26/3399">Thomas Ristenpart</author>
<author pid="46/6275">Vitaly Shmatikov</author>
<title>Breaking Web Applications Built On Top of Encrypted Data.</title>
<pages>920</pages>
<year>2016</year>
<volume>2016</volume>
<journal>IACR Cryptol. ePrint Arch.</journal>
<ee type="oa">http://eprint.iacr.org/2016/920</ee>
<url>db/journals/iacr/iacr2016.html#GrubbsMNRS16</url>
</article>
</r>
<r><article publtype="informal" key="journals/iacr/WangPSR16" mdate="2020-10-20">
<author pid="56/4499-23">Liang Wang 0023</author>
<author pid="p/RPass">Rafael Pass</author>
<author pid="s/AShelat">Abhi Shelat</author>
<author pid="26/3399">Thomas Ristenpart</author>
<title>Secure Channel Injection and Anonymous Proofs of Account Ownership.</title>
<pages>925</pages>
<year>2016</year>
<volume>2016</volume>
<journal>IACR Cryptol. ePrint Arch.</journal>
<ee type="oa">http://eprint.iacr.org/2016/925</ee>
<url>db/journals/iacr/iacr2016.html#WangPSR16</url>
</article>
</r>
<r><inproceedings key="conf/ccs/WangDARS15" mdate="2025-01-19">
<author pid="56/4499-23">Liang Wang 0023</author>
<author pid="116/8359">Kevin P. Dyer</author>
<author pid="a/AdityaAkella">Aditya Akella</author>
<author pid="26/3399">Thomas Ristenpart</author>
<author pid="s/ThomasShrimpton">Thomas Shrimpton</author>
<title>Seeing through Network-Protocol Obfuscation.</title>
<pages>57-69</pages>
<year>2015</year>
<booktitle>CCS</booktitle>
<ee>https://doi.org/10.1145/2810103.2813715</ee>
<ee>https://www.wikidata.org/entity/Q130820566</ee>
<crossref>conf/ccs/2015</crossref>
<url>db/conf/ccs/ccs2015.html#WangDARS15</url>
</inproceedings>
</r>
<r><inproceedings key="conf/ccs/CashGPR15" mdate="2025-01-19">
<author pid="68/158">David Cash</author>
<author pid="139/2372">Paul Grubbs</author>
<author pid="130/6989">Jason Perry</author>
<author pid="26/3399">Thomas Ristenpart</author>
<title>Leakage-Abuse Attacks Against Searchable Encryption.</title>
<pages>668-679</pages>
<year>2015</year>
<booktitle>CCS</booktitle>
<ee>https://doi.org/10.1145/2810103.2813700</ee>
<ee>https://www.wikidata.org/entity/Q130841501</ee>
<crossref>conf/ccs/2015</crossref>
<url>db/conf/ccs/ccs2015.html#CashGPR15</url>
</inproceedings>
</r>
<r><inproceedings key="conf/ccs/FredriksonJR15" mdate="2024-10-06">
<author orcid="0000-0003-1820-1698" pid="38/2612">Matt Fredrikson</author>
<author pid="j/SomeshJha">Somesh Jha</author>
<author pid="26/3399">Thomas Ristenpart</author>
<title>Model Inversion Attacks that Exploit Confidence Information and Basic Countermeasures.</title>
<pages>1322-1333</pages>
<year>2015</year>
<booktitle>CCS</booktitle>
<ee>https://doi.org/10.1145/2810103.2813677</ee>
<crossref>conf/ccs/2015</crossref>
<url>db/conf/ccs/ccs2015.html#FredriksonJR15</url>
</inproceedings>
</r>
<r><inproceedings key="conf/eurocrypt/DodisGGJR15" mdate="2019-08-20">
<author pid="d/YevgeniyDodis">Yevgeniy Dodis</author>
<author pid="115/4391">Chaya Ganesh</author>
<author pid="31/11062">Alexander Golovnev</author>
<author pid="j/AriJuels">Ari Juels</author>
<author pid="26/3399">Thomas Ristenpart</author>
<title>A Formal Treatment of Backdoored Pseudorandom Generators.</title>
<pages>101-126</pages>
<year>2015</year>
<booktitle>EUROCRYPT (1)</booktitle>
<ee type="oa">https://doi.org/10.1007/978-3-662-46800-5_5</ee>
<crossref>conf/eurocrypt/2015-1</crossref>
<url>db/conf/eurocrypt/eurocrypt2015-1.html#DodisGGJR15</url>
</inproceedings>
</r>
<r><inproceedings key="conf/sp/ChatterjeeBJR15" mdate="2023-03-24">
<author pid="03/9962">Rahul Chatterjee 0001</author>
<author pid="27/3087">Joseph Bonneau</author>
<author pid="j/AriJuels">Ari Juels</author>
<author pid="26/3399">Thomas Ristenpart</author>
<title>Cracking-Resistant Password Vaults Using Natural Language Encoders.</title>
<pages>481-498</pages>
<year>2015</year>
<booktitle>IEEE Symposium on Security and Privacy</booktitle>
<ee>https://doi.org/10.1109/SP.2015.36</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/SP.2015.36</ee>
<crossref>conf/sp/2015</crossref>
<url>db/conf/sp/sp2015.html#ChatterjeeBJR15</url>
</inproceedings>
</r>
<r><inproceedings key="conf/uss/EverspaughCSJR15" mdate="2021-02-01">
<author pid="26/4437">Adam Everspaugh</author>
<author pid="03/9962">Rahul Chatterjee 0001</author>
<author pid="165/8373">Samuel Scott</author>
<author pid="j/AriJuels">Ari Juels</author>
<author pid="26/3399">Thomas Ristenpart</author>
<title>The Pythia PRF Service.</title>
<pages>547-562</pages>
<year>2015</year>
<booktitle>USENIX Security Symposium</booktitle>
<ee type="oa">https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/everspaugh</ee>
<crossref>conf/uss/2015</crossref>
<url>db/conf/uss/uss2015.html#EverspaughCSJR15</url>
</inproceedings>
</r>
<r><inproceedings key="conf/uss/VaradarajanZRS15" mdate="2021-02-01">
<author pid="17/8064">Venkatanathan Varadarajan</author>
<author pid="77/3503">Yinqian Zhang</author>
<author pid="26/3399">Thomas Ristenpart</author>
<author pid="s/MichaelMSwift">Michael M. Swift</author>
<title>A Placement Vulnerability Study in Multi-Tenant Public Clouds.</title>
<pages>913-928</pages>
<year>2015</year>
<booktitle>USENIX Security Symposium</booktitle>
<ee type="oa">https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/varadarajan</ee>
<crossref>conf/uss/2015</crossref>
<url>db/conf/uss/uss2015.html#VaradarajanZRS15</url>
</inproceedings>
</r>
<r><article publtype="informal" key="journals/corr/VaradarajanZRS15" mdate="2018-08-13">
<author pid="17/8064">Venkatanathan Varadarajan</author>
<author pid="77/3503">Yinqian Zhang</author>
<author pid="26/3399">Thomas Ristenpart</author>
<author pid="s/MichaelMSwift">Michael M. Swift</author>
<title>A Placement Vulnerability Study in Multi-tenant Public Clouds.</title>
<year>2015</year>
<volume>abs/1507.03114</volume>
<journal>CoRR</journal>
<ee type="oa">http://arxiv.org/abs/1507.03114</ee>
<url>db/journals/corr/corr1507.html#VaradarajanZRS15</url>
</article>
</r>
<r><article publtype="informal" key="journals/iacr/SchneierFKR15" mdate="2020-05-11">
<author pid="s/BruceSchneier">Bruce Schneier</author>
<author pid="38/2612">Matthew Fredrikson</author>
<author pid="k/TadayoshiKohno">Tadayoshi Kohno</author>
<author pid="26/3399">Thomas Ristenpart</author>
<title>Surreptitiously Weakening Cryptographic Systems.</title>
<pages>97</pages>
<year>2015</year>
<volume>2015</volume>
<journal>IACR Cryptol. ePrint Arch.</journal>
<ee type="oa">http://eprint.iacr.org/2015/097</ee>
<url>db/journals/iacr/iacr2015.html#SchneierFKR15</url>
</article>
</r>
<r><article publtype="informal" key="journals/iacr/EverspaughCSJR15" mdate="2020-05-11">
<author pid="26/4437">Adam Everspaugh</author>
<author pid="03/9962">Rahul Chatterjee 0001</author>
<author pid="165/8373">Samuel Scott</author>
<author pid="j/AriJuels">Ari Juels</author>
<author pid="26/3399">Thomas Ristenpart</author>
<title>The Pythia PRF Service.</title>
<pages>644</pages>
<year>2015</year>
<volume>2015</volume>
<journal>IACR Cryptol. ePrint Arch.</journal>
<ee type="oa">http://eprint.iacr.org/2015/644</ee>
<url>db/journals/iacr/iacr2015.html#EverspaughCSJR15</url>
</article>
</r>
<r><article publtype="informal" key="journals/iacr/ChatterjeeBJR15" mdate="2020-05-11">
<author pid="03/9962">Rahul Chatterjee 0001</author>
<author pid="27/3087">Joseph Bonneau</author>
<author pid="j/AriJuels">Ari Juels</author>
<author pid="26/3399">Thomas Ristenpart</author>
<title>Cracking-Resistant Password Vaults using Natural Language Encoders.</title>
<pages>788</pages>
<year>2015</year>
<volume>2015</volume>
<journal>IACR Cryptol. ePrint Arch.</journal>
<ee type="oa">http://eprint.iacr.org/2015/788</ee>
<url>db/journals/iacr/iacr2015.html#ChatterjeeBJR15</url>
</article>
</r>
<r><article key="journals/ieeesp/JuelsR14" mdate="2023-08-28">
<author pid="j/AriJuels">Ari Juels</author>
<author pid="26/3399">Thomas Ristenpart</author>
<title>Honey Encryption: Encryption beyond the Brute-Force Barrier.</title>
<pages>59-62</pages>
<year>2014</year>
<volume>12</volume>
<journal>IEEE Secur. Priv.</journal>
<number>4</number>
<ee>https://doi.org/10.1109/MSP.2014.67</ee>
<ee>http://doi.ieeecomputersociety.org/10.1109/MSP.2014.67</ee>
<ee>https://www.wikidata.org/entity/Q120984544</ee>
<url>db/journals/ieeesp/ieeesp12.html#JuelsR14</url>
</article>
</r>
<r><inproceedings key="conf/ccs/ZhangJRR14" mdate="2020-11-10">
<author pid="77/3503">Yinqian Zhang</author>
<author pid="j/AriJuels">Ari Juels</author>
<author pid="r/MichaelKReiter">Michael K. Reiter</author>
<author pid="26/3399">Thomas Ristenpart</author>
<title>Cross-Tenant Side-Channel Attacks in PaaS Clouds.</title>
<pages>990-1003</pages>
<year>2014</year>
<booktitle>CCS</booktitle>
<ee>https://doi.org/10.1145/2660267.2660356</ee>
<crossref>conf/ccs/2014</crossref>
<url>db/conf/ccs/ccs2014.html#ZhangJRR14</url>
</inproceedings>
</r>
<r><inproceedings key="conf/ccs/LuchaupSRJ14" mdate="2025-01-19">
<author pid="17/7429">Daniel Luchaup</author>
<author pid="s/ThomasShrimpton">Thomas Shrimpton</author>
<author pid="26/3399">Thomas Ristenpart</author>
<author pid="j/SomeshJha">Somesh Jha</author>
<title>Formatted Encryption Beyond Regular Languages.</title>
<pages>1292-1303</pages>
<year>2014</year>
<booktitle>CCS</booktitle>
<ee>https://doi.org/10.1145/2660267.2660351</ee>
<ee>https://www.wikidata.org/entity/Q130846692</ee>
<crossref>conf/ccs/2014</crossref>
<url>db/conf/ccs/ccs2014.html#LuchaupSRJ14</url>
</inproceedings>
</r>
<r><inproceedings key="conf/eurocrypt/JuelsR14" mdate="2018-06-26">
<author pid="j/AriJuels">Ari Juels</author>
<author pid="26/3399">Thomas Ristenpart</author>
<title>Honey Encryption: Security Beyond the Brute-Force Bound.</title>
<pages>293-310</pages>
<year>2014</year>
<booktitle>EUROCRYPT</booktitle>
<ee type="oa">https://doi.org/10.1007/978-3-642-55220-5_17</ee>
<crossref>conf/eurocrypt/2014</crossref>
<url>db/conf/eurocrypt/eurocrypt2014.html#JuelsR14</url>
</inproceedings>
</r>
<r><inproceedings key="conf/hotcloud/JellinekZRS14" mdate="2021-02-09">
<author pid="150/5888">Robert Jellinek</author>
<author pid="44/6741">Yan Zhai</author>
<author pid="26/3399">Thomas Ristenpart</author>
<author pid="s/MichaelMSwift">Michael M. Swift</author>
<title>A Day Late and a Dollar Short: The Case for Research on Cloud Billing Systems.</title>
<year>2014</year>
<booktitle>HotCloud</booktitle>
<ee type="oa">https://www.usenix.org/conference/hotcloud14/workshop-program/presentation/jellinek</ee>
<crossref>conf/hotcloud/2014</crossref>
<url>db/conf/hotcloud/hotcloud2014.html#JellinekZRS14</url>
</inproceedings>
</r>
<r><inproceedings key="conf/imc/WangNCRA14" mdate="2021-10-14">
<author pid="56/4499-23">Liang Wang 0023</author>
<author orcid="0000-0002-2692-7336" pid="20/8280">Antonio Nappa</author>
<author pid="35/3587">Juan Caballero</author>
<author pid="26/3399">Thomas Ristenpart</author>
<author pid="a/AdityaAkella">Aditya Akella</author>
<title>WhoWas: A Platform for Measuring Web Deployments on IaaS Clouds.</title>
<pages>101-114</pages>
<year>2014</year>
<booktitle>Internet Measurement Conference</booktitle>
<ee>https://doi.org/10.1145/2663716.2663742</ee>
<crossref>conf/imc/2014</crossref>
<url>db/conf/imc/imc2014.html#WangNCRA14</url>
</inproceedings>
</r>
<r><inproceedings key="conf/sp/EverspaughZJRS14" mdate="2023-03-24">
<author pid="26/4437">Adam Everspaugh</author>
<author pid="44/6741">Yan Zhai</author>
<author pid="150/5888">Robert Jellinek</author>
<author pid="26/3399">Thomas Ristenpart</author>
<author pid="s/MichaelMSwift">Michael M. Swift</author>
<title>Not-So-Random Numbers in Virtualized Linux and the Whirlwind RNG.</title>
<pages>559-574</pages>
<year>2014</year>
<booktitle>IEEE Symposium on Security and Privacy</booktitle>
<ee>https://doi.org/10.1109/SP.2014.42</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/SP.2014.42</ee>
<crossref>conf/sp/2014</crossref>
<url>db/conf/sp/sp2014.html#EverspaughZJRS14</url>
</inproceedings>
</r>
<r><inproceedings key="conf/uss/FredriksonLJLPR14" mdate="2021-02-01">
<author pid="38/2612">Matthew Fredrikson</author>
<author pid="02/1072">Eric Lantz</author>
<author pid="j/SomeshJha">Somesh Jha</author>
<author pid="35/5195">Simon M. Lin</author>
<author pid="p/DavidPage">David Page</author>
<author pid="26/3399">Thomas Ristenpart</author>
<title>Privacy in Pharmacogenetics: An End-to-End Case Study of Personalized Warfarin Dosing.</title>
<pages>17-32</pages>
<year>2014</year>
<booktitle>USENIX Security Symposium</booktitle>
<ee type="oa">https://www.usenix.org/conference/usenixsecurity14/technical-sessions/presentation/fredrikson_matthew</ee>
<crossref>conf/uss/2014</crossref>
<url>db/conf/uss/uss2014.html#FredriksonLJLPR14</url>
</inproceedings>
</r>
<r><inproceedings key="conf/uss/CheckowayNE0LRBMSF14" mdate="2021-02-01">
<author pid="14/8302">Stephen Checkoway</author>
<author pid="62/7604">Ruben Niederhagen</author>
<author pid="26/4437">Adam Everspaugh</author>
<author pid="74/4531-1">Matthew Green 0001</author>
<author pid="56/2224">Tanja Lange 0001</author>
<author pid="26/3399">Thomas Ristenpart</author>
<author pid="b/DanielJBernstein">Daniel J. Bernstein</author>
<author pid="150/5411">Jake Maskiewicz</author>
<author pid="35/1061">Hovav Shacham</author>
<author pid="38/2612">Matthew Fredrikson</author>
<title>On the Practical Exploitability of Dual EC in TLS Implementations.</title>
<pages>319-335</pages>
<year>2014</year>
<booktitle>USENIX Security Symposium</booktitle>
<ee type="oa">https://www.usenix.org/conference/usenixsecurity14/technical-sessions/presentation/checkoway</ee>
<crossref>conf/uss/2014</crossref>
<url>db/conf/uss/uss2014.html#CheckowayNE0LRBMSF14</url>
</inproceedings>
</r>
<r><inproceedings key="conf/uss/VaradarajanRS14" mdate="2021-02-01">
<author pid="17/8064">Venkatanathan Varadarajan</author>
<author pid="26/3399">Thomas Ristenpart</author>
<author pid="s/MichaelMSwift">Michael M. Swift</author>
<title>Scheduler-based Defenses against Cross-VM Side-channels.</title>
<pages>687-702</pages>
<year>2014</year>
<booktitle>USENIX Security Symposium</booktitle>
<ee type="oa">https://www.usenix.org/conference/usenixsecurity14/technical-sessions/presentation/varadarajan</ee>
<crossref>conf/uss/2014</crossref>
<url>db/conf/uss/uss2014.html#VaradarajanRS14</url>
</inproceedings>
</r>
<r><inproceedings key="conf/uss/LuchaupDJRS14" mdate="2021-02-01">
<author pid="17/7429">Daniel Luchaup</author>
<author pid="116/8359">Kevin P. Dyer</author>
<author pid="j/SomeshJha">Somesh Jha</author>
<author pid="26/3399">Thomas Ristenpart</author>
<author pid="s/ThomasShrimpton">Thomas Shrimpton</author>
<title>LibFTE: A Toolkit for Constructing Practical, Format-Abiding Encryption Schemes.</title>
<pages>877-891</pages>
<year>2014</year>
<booktitle>USENIX Security Symposium</booktitle>
<ee type="oa">https://www.usenix.org/conference/usenixsecurity14/technical-sessions/presentation/luchaup</ee>
<crossref>conf/uss/2014</crossref>
<url>db/conf/uss/uss2014.html#LuchaupDJRS14</url>
</inproceedings>
</r>
<r><article publtype="informal" key="journals/iacr/JuelsR14" mdate="2020-05-11">
<author pid="j/AriJuels">Ari Juels</author>
<author pid="26/3399">Thomas Ristenpart</author>
<title>Honey Encryption: Security Beyond the Brute-Force Bound.</title>
<pages>155</pages>
<year>2014</year>
<volume>2014</volume>
<journal>IACR Cryptol. ePrint Arch.</journal>
<ee type="oa">http://eprint.iacr.org/2014/155</ee>
<url>db/journals/iacr/iacr2014.html#JuelsR14</url>
</article>
</r>
<r><inproceedings key="conf/ccs/DyerCRS13" mdate="2025-01-19">
<author pid="116/8359">Kevin P. Dyer</author>
<author pid="43/4410">Scott E. Coull</author>
<author pid="26/3399">Thomas Ristenpart</author>
<author pid="s/ThomasShrimpton">Thomas Shrimpton</author>
<title>Protocol misidentification made easy with format-transforming encryption.</title>
<pages>61-72</pages>
<year>2013</year>
<booktitle>CCS</booktitle>
<ee>https://doi.org/10.1145/2508859.2516657</ee>
<ee>https://www.wikidata.org/entity/Q130827582</ee>
<crossref>conf/ccs/2013</crossref>
<url>db/conf/ccs/ccs2013.html#DyerCRS13</url>
</inproceedings>
</r>
<r><inproceedings key="conf/crypto/RistenpartY13" mdate="2024-05-07">
<author orcid="0000-0002-8642-9558" pid="26/3399">Thomas Ristenpart</author>
<author pid="93/5760">Scott Yilek</author>
<title>The Mix-and-Cut Shuffle: Small-Domain Encryption Secure against N Queries.</title>
<pages>392-409</pages>
<year>2013</year>
<booktitle>CRYPTO (1)</booktitle>
<ee type="oa">https://doi.org/10.1007/978-3-642-40041-4_22</ee>
<crossref>conf/crypto/2013-1</crossref>
<url>db/conf/crypto/crypto2013-1.html#RistenpartY13</url>
</inproceedings>
</r>
<r><inproceedings key="conf/eurocrypt/BellareKR13" mdate="2024-05-07">
<author pid="b/MBellare">Mihir Bellare</author>
<author pid="53/9958">Sriram Keelveedhi</author>
<author orcid="0000-0002-8642-9558" pid="26/3399">Thomas Ristenpart</author>
<title>Message-Locked Encryption and Secure Deduplication.</title>
<pages>296-312</pages>
<year>2013</year>
<booktitle>EUROCRYPT</booktitle>
<ee type="oa">https://doi.org/10.1007/978-3-642-38348-9_18</ee>
<crossref>conf/eurocrypt/2013</crossref>
<url>db/conf/eurocrypt/eurocrypt2013.html#BellareKR13</url>
</inproceedings>
</r>
<r><inproceedings key="conf/imc/HeFWGAR13" mdate="2021-10-14">
<author pid="95/1050">Keqiang He</author>
<author pid="143/5691">Alexis Fisher</author>
<author pid="56/4499-23">Liang Wang 0023</author>
<author orcid="0000-0003-3771-7876" pid="07/9556">Aaron Gember</author>
<author pid="a/AdityaAkella">Aditya Akella</author>
<author pid="26/3399">Thomas Ristenpart</author>
<title>Next stop, the cloud: understanding modern web service deployment in EC2 and azure.</title>
<pages>177-190</pages>
<year>2013</year>
<booktitle>Internet Measurement Conference</booktitle>
<ee>https://doi.org/10.1145/2504730.2504740</ee>
<crossref>conf/imc/2013</crossref>
<url>db/conf/imc/imc2013.html#HeFWGAR13</url>
</inproceedings>
</r>
<r><inproceedings key="conf/uss/KeelveedhiBR13" mdate="2021-02-01">
<author pid="53/9958">Sriram Keelveedhi</author>
<author pid="b/MBellare">Mihir Bellare</author>
<author pid="26/3399">Thomas Ristenpart</author>
<title>DupLESS: Server-Aided Encryption for Deduplicated Storage.</title>
<pages>179-194</pages>
<year>2013</year>
<booktitle>USENIX Security Symposium</booktitle>
<ee type="oa">https://www.usenix.org/conference/usenixsecurity13/technical-sessions/presentation/bellare</ee>
<crossref>conf/uss/2013</crossref>
<url>db/conf/uss/uss2013.html#KeelveedhiBR13</url>
</inproceedings>
</r>
<r><inproceedings key="conf/uss/DavidsonMRJ13" mdate="2021-02-01">
<author pid="37/5586">Drew Davidson</author>
<author pid="121/1116">Benjamin Moench</author>
<author pid="26/3399">Thomas Ristenpart</author>
<author pid="j/SomeshJha">Somesh Jha</author>
<title>FIE on Firmware: Finding Vulnerabilities in Embedded Systems Using Symbolic Execution.</title>
<pages>463-478</pages>
<year>2013</year>
<booktitle>USENIX Security Symposium</booktitle>
<ee type="oa">https://www.usenix.org/conference/usenixsecurity13/technical-sessions/paper/davidson</ee>
<crossref>conf/uss/2013</crossref>
<url>db/conf/uss/uss2013.html#DavidsonMRJ13</url>
</inproceedings>
</r>
<r><article publtype="informal" key="journals/iacr/DodisRST13" mdate="2020-05-11">
<author pid="d/YevgeniyDodis">Yevgeniy Dodis</author>
<author pid="26/3399">Thomas Ristenpart</author>
<author pid="87/1608">John P. Steinberger</author>
<author pid="38/937">Stefano Tessaro</author>
<title>To Hash or Not to Hash Again? (In)differentiability Results for H<sup>2</sup> and HMAC.</title>
<pages>382</pages>
<year>2013</year>
<volume>2013</volume>
<journal>IACR Cryptol. ePrint Arch.</journal>
<ee type="oa">http://eprint.iacr.org/2013/382</ee>
<url>db/journals/iacr/iacr2013.html#DodisRST13</url>
</article>
</r>
<r><article publtype="informal" key="journals/iacr/BellareKR13" mdate="2020-05-11">
<author pid="b/MBellare">Mihir Bellare</author>
<author pid="53/9958">Sriram Keelveedhi</author>
<author pid="26/3399">Thomas Ristenpart</author>
<title>DupLESS: Server-Aided Encryption for Deduplicated Storage.</title>
<pages>429</pages>
<year>2013</year>
<volume>2013</volume>
<journal>IACR Cryptol. ePrint Arch.</journal>
<ee type="oa">http://eprint.iacr.org/2013/429</ee>
<url>db/journals/iacr/iacr2013.html#BellareKR13</url>
</article>
</r>
<r><inproceedings key="conf/ccs/VaradarajanKFRS12" mdate="2020-11-10">
<author pid="17/8064">Venkatanathan Varadarajan</author>
<author pid="18/10369">Thawan Kooburat</author>
<author pid="119/7711">Benjamin Farley</author>
<author pid="26/3399">Thomas Ristenpart</author>
<author pid="s/MichaelMSwift">Michael M. Swift</author>
<title>Resource-freeing attacks: improve your cloud performance (at your neighbor's expense).</title>
<pages>281-292</pages>
<year>2012</year>
<booktitle>CCS</booktitle>
<ee>https://doi.org/10.1145/2382196.2382228</ee>
<crossref>conf/ccs/2012</crossref>
<url>db/conf/ccs/ccs2012.html#VaradarajanKFRS12</url>
</inproceedings>
</r>
<r><inproceedings key="conf/ccs/ZhangJRR12" mdate="2025-01-19">
<author pid="77/3503">Yinqian Zhang</author>
<author pid="j/AriJuels">Ari Juels</author>
<author pid="r/MichaelKReiter">Michael K. Reiter</author>
<author pid="26/3399">Thomas Ristenpart</author>
<title>Cross-VM side channels and their use to extract private keys.</title>
<pages>305-316</pages>
<year>2012</year>
<booktitle>CCS</booktitle>
<ee>https://doi.org/10.1145/2382196.2382230</ee>
<ee>https://www.wikidata.org/entity/Q131117940</ee>
<crossref>conf/ccs/2012</crossref>
<url>db/conf/ccs/ccs2012.html#ZhangJRR12</url>
</inproceedings>
</r>
<r><inproceedings key="conf/cloud/FarleyJVRBS12" mdate="2018-11-06">
<author pid="119/7711">Benjamin Farley</author>
<author pid="j/AriJuels">Ari Juels</author>
<author pid="17/8064">Venkatanathan Varadarajan</author>
<author pid="26/3399">Thomas Ristenpart</author>
<author pid="33/972">Kevin D. Bowers</author>
<author pid="s/MichaelMSwift">Michael M. Swift</author>
<title>More for your money: exploiting performance heterogeneity in public clouds.</title>
<pages>20</pages>
<year>2012</year>
<booktitle>SoCC</booktitle>
<ee>https://doi.org/10.1145/2391229.2391249</ee>
<crossref>conf/cloud/2012</crossref>
<url>db/conf/cloud/socc2012.html#FarleyJVRBS12</url>
</inproceedings>
</r>
<r><inproceedings key="conf/crypto/BellareRT12" mdate="2018-06-26">
<author pid="b/MBellare">Mihir Bellare</author>
<author pid="26/3399">Thomas Ristenpart</author>
<author pid="38/937">Stefano Tessaro</author>
<title>Multi-instance Security and Its Application to Password-Based Cryptography.</title>
<pages>312-329</pages>
<year>2012</year>
<booktitle>CRYPTO</booktitle>
<ee type="oa">https://doi.org/10.1007/978-3-642-32009-5_19</ee>
<crossref>conf/crypto/2012</crossref>
<url>db/conf/crypto/crypto2012.html#BellareRT12</url>
</inproceedings>
</r>
<r><inproceedings key="conf/crypto/DodisRST12" mdate="2024-05-07">
<author pid="d/YevgeniyDodis">Yevgeniy Dodis</author>
<author orcid="0000-0002-8642-9558" pid="26/3399">Thomas Ristenpart</author>
<author pid="87/1608">John P. Steinberger</author>
<author pid="38/937">Stefano Tessaro</author>
<title>To Hash or Not to Hash Again? (In)Differentiability Results for H 2 and HMAC.</title>
<pages>348-366</pages>
<year>2012</year>
<booktitle>CRYPTO</booktitle>
<ee type="oa">https://doi.org/10.1007/978-3-642-32009-5_21</ee>
<crossref>conf/crypto/2012</crossref>
<url>db/conf/crypto/crypto2012.html#DodisRST12</url>
</inproceedings>
</r>
<r><inproceedings key="conf/sp/DyerCRS12" mdate="2023-03-24">
<author pid="116/8359">Kevin P. Dyer</author>
<author pid="43/4410">Scott E. Coull</author>
<author pid="26/3399">Thomas Ristenpart</author>
<author pid="s/ThomasShrimpton">Thomas Shrimpton</author>
<title>Peek-a-Boo, I Still See You: Why Efficient Traffic Analysis Countermeasures Fail.</title>
<pages>332-346</pages>
<year>2012</year>
<booktitle>IEEE Symposium on Security and Privacy</booktitle>
<ee>https://doi.org/10.1109/SP.2012.28</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/SP.2012.28</ee>
<crossref>conf/sp/2012</crossref>
<url>db/conf/sp/sp2012.html#DyerCRS12</url>
</inproceedings>
</r>
<r><inproceedings key="conf/tcc/DodisRV12" mdate="2024-05-07">
<author pid="d/YevgeniyDodis">Yevgeniy Dodis</author>
<author orcid="0000-0002-8642-9558" pid="26/3399">Thomas Ristenpart</author>
<author pid="v/SPVadhan">Salil P. Vadhan</author>
<title>Randomness Condensers for Efficiently Samplable, Seed-Dependent Sources.</title>
<pages>618-635</pages>
<year>2012</year>
<booktitle>TCC</booktitle>
<ee type="oa">https://doi.org/10.1007/978-3-642-28914-9_35</ee>
<crossref>conf/tcc/2012</crossref>
<url>db/conf/tcc/tcc2012.html#DodisRV12</url>
</inproceedings>
</r>
<r><inproceedings key="conf/woot/FrisbyMRR12" mdate="2021-02-01">
<author pid="121/1111">WesLee Frisby</author>
<author pid="121/1116">Benjamin Moench</author>
<author pid="r/BenRecht">Benjamin Recht</author>
<author pid="26/3399">Thomas Ristenpart</author>
<title>Security Analysis of Smartphone Point-of-Sale Systems.</title>
<pages>22-33</pages>
<year>2012</year>
<booktitle>WOOT</booktitle>
<ee type="oa">http://www.usenix.org/conference/woot12/security-analysis-smartphone-point-sale-systems</ee>
<crossref>conf/woot/2012</crossref>
<url>db/conf/woot/woot2012.html#FrisbyMRR12</url>
</inproceedings>
</r>
<r><article publtype="informal" key="journals/iacr/BellareTR12" mdate="2020-05-11">
<author pid="b/MBellare">Mihir Bellare</author>
<author pid="38/937">Stefano Tessaro</author>
<author pid="26/3399">Thomas Ristenpart</author>
<title>Multi-Instance Security and its Application to Password-Based Cryptography.</title>
<pages>196</pages>
<year>2012</year>
<volume>2012</volume>
<journal>IACR Cryptol. ePrint Arch.</journal>
<ee type="oa">http://eprint.iacr.org/2012/196</ee>
<url>db/journals/iacr/iacr2012.html#BellareTR12</url>
</article>
</r>
<r><article publtype="informal" key="journals/iacr/BellareBNRSSY12" mdate="2020-05-11">
<author pid="b/MBellare">Mihir Bellare</author>
<author pid="53/1085">Zvika Brakerski</author>
<author pid="n/MoniNaor">Moni Naor</author>
<author pid="26/3399">Thomas Ristenpart</author>
<author pid="s/GilSegev">Gil Segev 0001</author>
<author pid="35/1061">Hovav Shacham</author>
<author pid="93/5760">Scott Yilek</author>
<title>Hedged Public-key Encryption: How to Protect against Bad Randomness.</title>
<pages>220</pages>
<year>2012</year>
<volume>2012</volume>
<journal>IACR Cryptol. ePrint Arch.</journal>
<ee type="oa">http://eprint.iacr.org/2012/220</ee>
<url>db/journals/iacr/iacr2012.html#BellareBNRSSY12</url>
</article>
</r>
<r><article publtype="informal" key="journals/iacr/DyerCRS12" mdate="2020-05-11">
<author pid="116/8359">Kevin P. Dyer</author>
<author pid="43/4410">Scott E. Coull</author>
<author pid="26/3399">Thomas Ristenpart</author>
<author pid="s/ThomasShrimpton">Thomas Shrimpton</author>
<title>Format-Transforming Encryption: More than Meets the DPI.</title>
<pages>494</pages>
<year>2012</year>
<volume>2012</volume>
<journal>IACR Cryptol. ePrint Arch.</journal>
<ee type="oa">http://eprint.iacr.org/2012/494</ee>
<url>db/journals/iacr/iacr2012.html#DyerCRS12</url>
</article>
</r>
<r><article publtype="informal" key="journals/iacr/BellareKR12" mdate="2020-05-11">
<author pid="b/MBellare">Mihir Bellare</author>
<author pid="53/9958">Sriram Keelveedhi</author>
<author pid="26/3399">Thomas Ristenpart</author>
<title>Message-Locked Encryption and Secure Deduplication.</title>
<pages>631</pages>
<year>2012</year>
<volume>2012</volume>
<journal>IACR Cryptol. ePrint Arch.</journal>
<ee type="oa">http://eprint.iacr.org/2012/631</ee>
<url>db/journals/iacr/iacr2012.html#BellareKR12</url>
</article>
</r>
<r><inproceedings key="conf/asiacrypt/PatersonRS11" mdate="2018-06-26">
<author pid="39/780">Kenneth G. Paterson</author>
<author pid="26/3399">Thomas Ristenpart</author>
<author pid="s/ThomasShrimpton">Thomas Shrimpton</author>
<title>Tag Size Does Matter: Attacks and Proofs for the TLS Record Protocol.</title>
<pages>372-389</pages>
<year>2011</year>
<booktitle>ASIACRYPT</booktitle>
<ee type="oa">https://doi.org/10.1007/978-3-642-25385-0_20</ee>
<crossref>conf/asiacrypt/2011</crossref>
<url>db/conf/asiacrypt/asiacrypt2011.html#PatersonRS11</url>
</inproceedings>
</r>
<r><inproceedings key="conf/eurocrypt/RistenpartSS11" mdate="2018-06-26">
<author pid="26/3399">Thomas Ristenpart</author>
<author pid="35/1061">Hovav Shacham</author>
<author pid="s/ThomasShrimpton">Thomas Shrimpton</author>
<title>Careful with Composition: Limitations of the Indifferentiability Framework.</title>
<pages>487-506</pages>
<year>2011</year>
<booktitle>EUROCRYPT</booktitle>
<ee type="oa">https://doi.org/10.1007/978-3-642-20465-4_27</ee>
<crossref>conf/eurocrypt/2011</crossref>
<url>db/conf/eurocrypt/eurocrypt2011.html#RistenpartSS11</url>
</inproceedings>
</r>
<r><inproceedings key="conf/www/ZhangRSV11" mdate="2024-02-09">
<author pid="68/1429-12">Qing Zhang 0012</author>
<author pid="26/3399">Thomas Ristenpart</author>
<author pid="s/StefanSavage">Stefan Savage</author>
<author pid="v/GeoffreyMVoelker">Geoffrey M. Voelker</author>
<title>Got traffic?: an evaluation of click traffic providers.</title>
<pages>19-26</pages>
<year>2011</year>
<booktitle>WebQuality@WWW</booktitle>
<ee>https://doi.org/10.1145/1964114.1964119</ee>
<crossref>conf/www/2011webquality</crossref>
<url>db/conf/www/webquality2011.html#ZhangRSV11</url>
</inproceedings>
</r>
<r><proceedings key="conf/ccs/2011ccsw" mdate="2020-11-10">
<editor pid="c/ChristianCachin">Christian Cachin</editor>
<editor pid="26/3399">Thomas Ristenpart</editor>
<title>Proceedings of the 3rd ACM Cloud Computing Security Workshop, CCSW 2011, Chicago, IL, USA, October 21, 2011</title>
<publisher>ACM</publisher>
<booktitle>CCSW</booktitle>
<year>2011</year>
<isbn>978-1-4503-1004-8</isbn>
<ee>http://dl.acm.org/citation.cfm?id=2046660</ee>
<url>db/conf/ccs/ccsw2011.html</url>
</proceedings>
</r>
<r><article publtype="informal" key="journals/iacr/RistenpartSS11" mdate="2020-05-11">
<author pid="26/3399">Thomas Ristenpart</author>
<author pid="35/1061">Hovav Shacham</author>
<author pid="s/ThomasShrimpton">Thomas Shrimpton</author>
<title>Careful with Composition: Limitations of Indifferentiability and Universal Composability.</title>
<pages>339</pages>
<year>2011</year>
<volume>2011</volume>
<journal>IACR Cryptol. ePrint Arch.</journal>
<ee type="oa">http://eprint.iacr.org/2011/339</ee>
<url>db/journals/iacr/iacr2011.html#RistenpartSS11</url>
</article>
</r>
<r><phdthesis key="phd/basesearch/Ristenpart10" mdate="2017-04-10">
<author pid="26/3399">Thomas Ristenpart</author>
<title>New approaches for the design and analysis of cryptographic hash functions.</title>
<year>2010</year>
<school>University of California, San Diego, USA</school>
<ee>http://www.escholarship.org/uc/item/75x1515p</ee>
<ee>http://n2t.net/ark:/20775/bb2287961g</ee>
<ee>https://www.base-search.net/Record/2f2f3e6b84a9fedeb6e5fa1688dff8f5815d6928a9f61ba7ae2519f533d7008c</ee>
<note type="source">base-search.net (ftcdlib:qt75x1515p)</note>
</phdthesis>
</r>
<r><inproceedings key="conf/asiacrypt/FischlinLRSST10" mdate="2018-06-26">
<author pid="72/5460">Marc Fischlin</author>
<author pid="63/3592">Anja Lehmann</author>
<author pid="26/3399">Thomas Ristenpart</author>
<author pid="s/ThomasShrimpton">Thomas Shrimpton</author>
<author pid="82/4585">Martijn Stam</author>
<author pid="38/937">Stefano Tessaro</author>
<title>Random Oracles with(out) Programmability.</title>
<pages>303-320</pages>
<year>2010</year>
<booktitle>ASIACRYPT</booktitle>
<ee type="oa">https://doi.org/10.1007/978-3-642-17373-8_18</ee>
<crossref>conf/asiacrypt/2010</crossref>
<url>db/conf/asiacrypt/asiacrypt2010.html#FischlinLRSST10</url>
</inproceedings>
</r>
<r><inproceedings key="conf/ndss/RistenpartY10" mdate="2021-02-01">
<author pid="26/3399">Thomas Ristenpart</author>
<author pid="93/5760">Scott Yilek</author>
<title>When Good Randomness Goes Bad: Virtual Machine Reset Vulnerabilities and Hedging Deployed Cryptography.</title>
<year>2010</year>
<booktitle>NDSS</booktitle>
<ee type="oa">https://www.ndss-symposium.org/ndss2010/when-good-randomness-goes-bad-virtual-machine-reset-vulnerabilities-and-hedging-deployed</ee>
<crossref>conf/ndss/2010</crossref>
<url>db/conf/ndss/ndss2010.html#RistenpartY10</url>
</inproceedings>
</r>
<r><inproceedings key="conf/asiacrypt/BellareBNRSSY09" mdate="2019-06-16">
<author pid="b/MBellare">Mihir Bellare</author>
<author pid="53/1085">Zvika Brakerski</author>
<author pid="n/MoniNaor">Moni Naor</author>
<author pid="26/3399">Thomas Ristenpart</author>
<author pid="s/GilSegev">Gil Segev 0001</author>
<author pid="35/1061">Hovav Shacham</author>
<author pid="93/5760">Scott Yilek</author>
<title>Hedged Public-Key Encryption: How to Protect against Bad Randomness.</title>
<pages>232-249</pages>
<year>2009</year>
<booktitle>ASIACRYPT</booktitle>
<ee>https://doi.org/10.1007/978-3-642-10366-7_14</ee>
<crossref>conf/asiacrypt/2009</crossref>
<url>db/conf/asiacrypt/asiacrypt2009.html#BellareBNRSSY09</url>
</inproceedings>
</r>
<r><inproceedings key="conf/ccs/RistenpartTSS09" mdate="2025-03-03">
<author pid="26/3399">Thomas Ristenpart</author>
<author orcid="0000-0002-8884-9564" pid="t/EranTromer">Eran Tromer</author>
<author pid="35/1061">Hovav Shacham</author>
<author pid="s/StefanSavage">Stefan Savage</author>
<title>Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds.</title>
<pages>199-212</pages>
<year>2009</year>
<booktitle>CCS</booktitle>
<ee>https://doi.org/10.1145/1653662.1653687</ee>
<crossref>conf/ccs/2009</crossref>
<url>db/conf/ccs/ccs2009.html#RistenpartTSS09</url>
</inproceedings>
</r>
<r><inproceedings key="conf/eurocrypt/DodisRS09" mdate="2018-06-26">
<author pid="d/YevgeniyDodis">Yevgeniy Dodis</author>
<author pid="26/3399">Thomas Ristenpart</author>
<author pid="s/ThomasShrimpton">Thomas Shrimpton</author>
<title>Salvaging Merkle-Damg&#229;rd for Practical Applications.</title>
<pages>371-388</pages>
<year>2009</year>
<booktitle>EUROCRYPT</booktitle>
<ee type="oa">https://doi.org/10.1007/978-3-642-01001-9_22</ee>
<crossref>conf/eurocrypt/2009</crossref>
<url>db/conf/eurocrypt/eurocrypt2009.html#DodisRS09</url>
</inproceedings>
</r>
<r><inproceedings key="conf/eurocrypt/BellareR09" mdate="2018-06-26">
<author pid="b/MBellare">Mihir Bellare</author>
<author pid="26/3399">Thomas Ristenpart</author>
<title>Simulation without the Artificial Abort: Simplified Proof and Improved Concrete Security for Waters' IBE Scheme.</title>
<pages>407-424</pages>
<year>2009</year>
<booktitle>EUROCRYPT</booktitle>
<ee type="oa">https://doi.org/10.1007/978-3-642-01001-9_24</ee>
<crossref>conf/eurocrypt/2009</crossref>
<url>db/conf/eurocrypt/eurocrypt2009.html#BellareR09</url>
</inproceedings>
</r>
<r><inproceedings key="conf/sacrypt/BellareRRS09" mdate="2018-06-26">
<author pid="b/MBellare">Mihir Bellare</author>
<author pid="26/3399">Thomas Ristenpart</author>
<author pid="r/PhillipRogaway">Phillip Rogaway</author>
<author pid="63/6123">Till Stegers</author>
<title>Format-Preserving Encryption.</title>
<pages>295-312</pages>
<year>2009</year>
<booktitle>Selected Areas in Cryptography</booktitle>
<ee type="oa">https://doi.org/10.1007/978-3-642-05445-7_19</ee>
<crossref>conf/sacrypt/2009</crossref>
<url>db/conf/sacrypt/sacrypt2009.html#BellareRRS09</url>
</inproceedings>
</r>
<r><article publtype="informal" key="journals/iacr/BellareR09" mdate="2020-05-11">
<author pid="b/MBellare">Mihir Bellare</author>
<author pid="26/3399">Thomas Ristenpart</author>
<title>Simulation without the Artificial Abort: Simplified Proof and Improved Concrete Security for Waters' IBE Scheme.</title>
<pages>84</pages>
<year>2009</year>
<volume>2009</volume>
<journal>IACR Cryptol. ePrint Arch.</journal>
<ee type="oa">http://eprint.iacr.org/2009/084</ee>
<url>db/journals/iacr/iacr2009.html#BellareR09</url>
</article>
</r>
<r><article publtype="informal" key="journals/iacr/DodisRS09" mdate="2020-05-11">
<author pid="d/YevgeniyDodis">Yevgeniy Dodis</author>
<author pid="26/3399">Thomas Ristenpart</author>
<author pid="s/ThomasShrimpton">Thomas Shrimpton</author>
<title>Salvaging Merkle-Damgard for Practical Applications.</title>
<pages>177</pages>
<year>2009</year>
<volume>2009</volume>
<journal>IACR Cryptol. ePrint Arch.</journal>
<ee type="oa">http://eprint.iacr.org/2009/177</ee>
<url>db/journals/iacr/iacr2009.html#DodisRS09</url>
</article>
</r>
<r><article publtype="informal" key="journals/iacr/BellareRRS09" mdate="2020-05-11">
<author pid="b/MBellare">Mihir Bellare</author>
<author pid="26/3399">Thomas Ristenpart</author>
<author pid="r/PhillipRogaway">Phillip Rogaway</author>
<author pid="63/6123">Till Stegers</author>
<title>Format-Preserving Encryption.</title>
<pages>251</pages>
<year>2009</year>
<volume>2009</volume>
<journal>IACR Cryptol. ePrint Arch.</journal>
<ee type="oa">http://eprint.iacr.org/2009/251</ee>
<url>db/journals/iacr/iacr2009.html#BellareRRS09</url>
</article>
</r>
<r><inproceedings key="conf/crypto/BellareFOR08" mdate="2017-05-26">
<author pid="b/MBellare">Mihir Bellare</author>
<author pid="72/5460">Marc Fischlin</author>
<author pid="55/3477">Adam O'Neill</author>
<author pid="26/3399">Thomas Ristenpart</author>
<title>Deterministic Encryption: Definitional Equivalences and Constructions without Random Oracles.</title>
<pages>360-378</pages>
<year>2008</year>
<booktitle>CRYPTO</booktitle>
<ee>https://doi.org/10.1007/978-3-540-85174-5_20</ee>
<crossref>conf/crypto/2008</crossref>
<url>db/conf/crypto/crypto2008.html#BellareFOR08</url>
</inproceedings>
</r>
<r><inproceedings key="conf/uss/RistenpartMKK08" mdate="2020-03-12">
<author pid="26/3399">Thomas Ristenpart</author>
<author pid="66/2982">Gabriel Maganis</author>
<author pid="k/AKrishnamurthy">Arvind Krishnamurthy</author>
<author pid="k/TadayoshiKohno">Tadayoshi Kohno</author>
<title>Privacy-Preserving Location Tracking of Lost or Stolen Devices: Cryptographic Techniques and Replacing Trusted Third Parties with DHTs.</title>
<pages>275-290</pages>
<year>2008</year>
<booktitle>USENIX Security Symposium</booktitle>
<ee type="oa">http://www.usenix.org/events/sec08/tech/full_papers/ristenpart/ristenpart.pdf</ee>
<crossref>conf/uss/2008</crossref>
<url>db/conf/uss/uss2008.html#RistenpartMKK08</url>
</inproceedings>
</r>
<r><article publtype="informal" key="journals/iacr/RistenpartS08" mdate="2020-05-11">
<author pid="26/3399">Thomas Ristenpart</author>
<author pid="s/ThomasShrimpton">Thomas Shrimpton</author>
<title>How to Build a Hash Function from any Collision-Resistant Function.</title>
<pages>189</pages>
<year>2008</year>
<volume>2008</volume>
<journal>IACR Cryptol. ePrint Arch.</journal>
<ee type="oa">http://eprint.iacr.org/2008/189</ee>
<url>db/journals/iacr/iacr2008.html#RistenpartS08</url>
</article>
</r>
<r><article publtype="informal" key="journals/iacr/BellareFOR08" mdate="2020-05-11">
<author pid="b/MBellare">Mihir Bellare</author>
<author pid="72/5460">Marc Fischlin</author>
<author pid="55/3477">Adam O'Neill</author>
<author pid="26/3399">Thomas Ristenpart</author>
<title>Deterministic Encryption: Definitional Equivalences and Constructions without Random Oracles.</title>
<pages>267</pages>
<year>2008</year>
<volume>2008</volume>
<journal>IACR Cryptol. ePrint Arch.</journal>
<ee type="oa">http://eprint.iacr.org/2008/267</ee>
<url>db/journals/iacr/iacr2008.html#BellareFOR08</url>
</article>
</r>
<r><inproceedings key="conf/asiacrypt/RistenpartS07" mdate="2017-05-19">
<author pid="26/3399">Thomas Ristenpart</author>
<author pid="s/ThomasShrimpton">Thomas Shrimpton</author>
<title>How to Build a Hash Function from Any Collision-Resistant Function.</title>
<pages>147-163</pages>
<year>2007</year>
<crossref>conf/asiacrypt/2007</crossref>
<booktitle>ASIACRYPT</booktitle>
<ee>https://doi.org/10.1007/978-3-540-76900-2_9</ee>
<url>db/conf/asiacrypt/asiacrypt2007.html#RistenpartS07</url>
</inproceedings>
</r>
<r><inproceedings key="conf/eurocrypt/RistenpartY07" mdate="2017-05-24">
<author pid="26/3399">Thomas Ristenpart</author>
<author pid="93/5760">Scott Yilek</author>
<title>The Power of Proofs-of-Possession: Securing Multiparty Signatures against Rogue-Key Attacks.</title>
<pages>228-245</pages>
<year>2007</year>
<crossref>conf/eurocrypt/2007</crossref>
<booktitle>EUROCRYPT</booktitle>
<ee>https://doi.org/10.1007/978-3-540-72540-4_13</ee>
<url>db/conf/eurocrypt/eurocrypt2007.html#RistenpartY07</url>
</inproceedings>
</r>
<r><inproceedings key="conf/fse/RistenpartR07" mdate="2018-11-14">
<author pid="26/3399">Thomas Ristenpart</author>
<author pid="r/PhillipRogaway">Phillip Rogaway</author>
<title>How to Enrich the Message Space of a Cipher.</title>
<pages>101-118</pages>
<year>2007</year>
<crossref>conf/fse/2007</crossref>
<booktitle>FSE</booktitle>
<ee>https://doi.org/10.1007/978-3-540-74619-5_7</ee>
<ee>https://www.wikidata.org/entity/Q56475239</ee>
<url>db/conf/fse/fse2007.html#RistenpartR07</url>
</inproceedings>
</r>
<r><inproceedings key="conf/icalp/BellareR07" mdate="2017-05-23">
<author pid="b/MBellare">Mihir Bellare</author>
<author pid="26/3399">Thomas Ristenpart</author>
<title>Hash Functions in the Dedicated-Key Setting: Design Choices and MPP Transforms.</title>
<pages>399-410</pages>
<year>2007</year>
<crossref>conf/icalp/2007</crossref>
<booktitle>ICALP</booktitle>
<ee>https://doi.org/10.1007/978-3-540-73420-8_36</ee>
<url>db/conf/icalp/icalp2007.html#BellareR07</url>
</inproceedings>
</r>
<r><article publtype="informal" key="journals/iacr/RistenpartR07" mdate="2020-05-11">
<author pid="26/3399">Thomas Ristenpart</author>
<author pid="r/PhillipRogaway">Phillip Rogaway</author>
<title>How to Enrich the Message Space of a Cipher.</title>
<pages>109</pages>
<year>2007</year>
<volume>2007</volume>
<journal>IACR Cryptol. ePrint Arch.</journal>
<ee type="oa">http://eprint.iacr.org/2007/109</ee>
<url>db/journals/iacr/iacr2007.html#RistenpartR07</url>
</article>
</r>
<r><article publtype="informal" key="journals/iacr/RistenpartY07" mdate="2020-05-11">
<author pid="26/3399">Thomas Ristenpart</author>
<author pid="93/5760">Scott Yilek</author>
<title>The Power of Proofs-of-Possession: Securing Multiparty Signatures against Rogue-Key Attacks.</title>
<pages>264</pages>
<year>2007</year>
<volume>2007</volume>
<journal>IACR Cryptol. ePrint Arch.</journal>
<ee type="oa">http://eprint.iacr.org/2007/264</ee>
<url>db/journals/iacr/iacr2007.html#RistenpartY07</url>
</article>
</r>
<r><article publtype="informal" key="journals/iacr/BellareR07" mdate="2020-05-11">
<author pid="b/MBellare">Mihir Bellare</author>
<author pid="26/3399">Thomas Ristenpart</author>
<title>Hash Functions in the Dedicated-Key Setting: Design Choices and MPP Transforms.</title>
<pages>271</pages>
<year>2007</year>
<volume>2007</volume>
<journal>IACR Cryptol. ePrint Arch.</journal>
<ee type="oa">http://eprint.iacr.org/2007/271</ee>
<url>db/journals/iacr/iacr2007.html#BellareR07</url>
</article>
</r>
<r><inproceedings key="conf/acsac/HsuCRLS06" mdate="2023-03-23">
<author pid="92/3473">Francis Hsu</author>
<author orcid="0000-0002-4072-0710" pid="86/475-3">Hao Chen 0003</author>
<author pid="26/3399">Thomas Ristenpart</author>
<author pid="12/975-3">Jason Li 0003</author>
<author orcid="0000-0002-2970-1391" pid="s/ZhendongSu">Zhendong Su 0001</author>
<title>Back to the Future: A Framework for Automatic Malware Removal and System Repair.</title>
<pages>257-268</pages>
<year>2006</year>
<crossref>conf/acsac/2006</crossref>
<booktitle>ACSAC</booktitle>
<ee>https://doi.org/10.1109/ACSAC.2006.16</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/ACSAC.2006.16</ee>
<url>db/conf/acsac/acsac2006.html#HsuCRLS06</url>
</inproceedings>
</r>
<r><inproceedings key="conf/asiacrypt/BellareR06" mdate="2024-05-07">
<author pid="b/MBellare">Mihir Bellare</author>
<author orcid="0000-0002-8642-9558" pid="26/3399">Thomas Ristenpart</author>
<title>Multi-Property-Preserving Hash Domain Extension and the EMD Transform.</title>
<pages>299-314</pages>
<year>2006</year>
<crossref>conf/asiacrypt/2006</crossref>
<booktitle>ASIACRYPT</booktitle>
<ee>https://doi.org/10.1007/11935230_20</ee>
<url>db/conf/asiacrypt/asiacrypt2006.html#BellareR06</url>
</inproceedings>
</r>
<r><article publtype="informal" key="journals/iacr/BellareR06" mdate="2020-05-11">
<author pid="b/MBellare">Mihir Bellare</author>
<author pid="26/3399">Thomas Ristenpart</author>
<title>Multi-Property-Preserving Hash Domain Extension and the EMD Transform.</title>
<pages>399</pages>
<year>2006</year>
<volume>2006</volume>
<journal>IACR Cryptol. ePrint Arch.</journal>
<ee type="oa">http://eprint.iacr.org/2006/399</ee>
<url>db/journals/iacr/iacr2006.html#BellareR06</url>
</article>
</r>
<coauthors n="211" nc="1">
<co c="0"><na f="a/Agarwal_0001:Rachit" pid="41/5447-1">Rachit Agarwal 0001</na></co>
<co c="0"><na f="a/Ahmad:Suleman" pid="260/8995">Suleman Ahmad</na></co>
<co c="0"><na f="a/Aikat:Jay" pid="22/149">Jay Aikat</na></co>
<co c="0"><na f="a/Akella:Aditya" pid="a/AdityaAkella">Aditya Akella</na></co>
<co c="0"><na f="a/Akhawe:Devdatta" pid="12/8302">Devdatta Akhawe</na></co>
<co c="0"><na f="a/Ali:Junade" pid="204/5129">Junade Ali</na></co>
<co c="0"><na f="a/Asharov:Gilad" pid="25/7423">Gilad Asharov</na></co>
<co c="0"><na f="a/Athayle:Anish" pid="184/6066">Anish Athayle</na></co>
<co c="0"><na f="b/Bailey:Michael_D=" pid="359/0958">Michael D. Bailey</na></co>
<co c="0"><na f="b/Bellare:Mihir" pid="b/MBellare">Mihir Bellare</na></co>
<co c="0"><na f="b/Bellini:Rosanna" pid="217/9409">Rosanna Bellini</na></co>
<co c="0"><na f="b/Bernstein:Daniel_J=" pid="b/DanielJBernstein">Daniel J. Bernstein</na></co>
<co c="0"><na f="b/Bhagat:Siddhant" pid="278/3009">Siddhant Bhagat</na></co>
<co c="0"><na f="b/Bhalerao:Rasika" pid="201/7550">Rasika Bhalerao</na></co>
<co c="0"><na f="b/Bhattacharya:Arkaprabha" pid="372/4046">Arkaprabha Bhattacharya</na></co>
<co c="0"><na f="b/Bindschaedler:Vincent" pid="117/2526">Vincent Bindschaedler</na></co>
<co c="0"><na f="b/Bohuk:Marina_Sanusi" pid="331/2515">Marina Sanusi Bohuk</na></co>
<co c="0"><na f="b/Boneh:Dan" pid="b/DanBoneh">Dan Boneh</na></co>
<co c="0"><na f="b/Bonneau:Joseph" pid="27/3087">Joseph Bonneau</na></co>
<co c="0"><na f="b/Bowers:Kevin_D=" pid="33/972">Kevin D. Bowers</na></co>
<co c="0"><na f="b/Brakerski:Zvika" pid="53/1085">Zvika Brakerski</na></co>
<co c="0"><na f="b/Breckenridge:Samuel" pid="417/9163">Samuel Breckenridge</na></co>
<co c="0"><na f="b/Brown:Lloyd" pid="272/7111">Lloyd Brown</na></co>
<co c="0"><na f="b/Brown:Megan_A=" pid="353/7554">Megan A. Brown</na></co>
<co c="0"><na f="b/Bursztein:Elie" pid="20/7004">Elie Bursztein</na></co>
<co c="0"><na f="c/Caballero:Juan" pid="35/3587">Juan Caballero</na></co>
<co c="0"><na f="c/Cachin:Christian" pid="c/ChristianCachin">Christian Cachin</na></co>
<co c="0"><na f="c/Cash:David" pid="68/158">David Cash</na></co>
<co c="0"><na f="c/Celi:Sof=iacute=a" pid="296/2589">Sof&#237;a Celi</na></co>
<co c="0"><na f="c/Chase:Jeffrey_S=" pid="c/JSChase">Jeffrey S. Chase</na></co>
<co c="0"><na f="c/Chatterjee_0001:Rahul" pid="03/9962">Rahul Chatterjee 0001</na></co>
<co c="0"><na f="c/Checkoway:Stephen" pid="14/8302">Stephen Checkoway</na></co>
<co c="0"><na f="c/Chen_0003:Hao" pid="86/475-3">Hao Chen 0003</na></co>
<co c="0"><na f="c/Chen:Janet_X=" pid="269/2166">Janet X. Chen</na></co>
<co c="0"><na f="c/Cheng:Kaishuo" pid="290/2358">Kaishuo Cheng</na></co>
<co c="0"><na f="c/Chowdhury:Anusha" pid="138/3391">Anusha Chowdhury</na></co>
<co c="0"><na f="c/Chung:Paul" pid="58/5795">Paul Chung</na></co>
<co c="0"><na f="c/Consolvo:Sunny" pid="61/1413">Sunny Consolvo</na></co>
<co c="0"><na f="c/Coull:Scott_E=" pid="43/4410">Scott E. Coull</na></co>
<co c="0"><na f="c/Crandall:Jedidiah_R=" pid="c/JRCrandall">Jedidiah R. Crandall</na></co>
<co c="0"><na f="c/Cuomo:Dana" pid="356/3064">Dana Cuomo</na></co>
<co c="0"><na f="d/Daffalla:Alaa" pid="303/6545">Alaa Daffalla</na></co>
<co c="0"><na f="d/Daniel:Tal" pid="05/9543">Tal Daniel</na></co>
<co c="0"><na f="d/Danos:Matan" pid="231/1859">Matan Danos</na></co>
<co c="0"><na f="d/Davidson:Drew" pid="37/5586">Drew Davidson</na></co>
<co c="0"><na f="d/Dell:Nicola" pid="75/11301">Nicola Dell</na></co>
<co c="0"><na f="d/Dixon:Lucas" pid="39/6853">Lucas Dixon</na></co>
<co c="0"><na f="d/Dodis:Yevgeniy" pid="d/YevgeniyDodis">Yevgeniy Dodis</na></co>
<co c="0"><na f="d/Doerfler:Periwinkle" pid="204/3432">Periwinkle Doerfler</na></co>
<co c="0"><na f="d/Dolci:Natalie" pid="381/1643">Natalie Dolci</na></co>
<co c="0"><na f="d/Durumeric:Zakir" pid="143/5673">Zakir Durumeric</na></co>
<co c="0"><na f="d/Dyer:Kevin_P=" pid="116/8359">Kevin P. Dyer</na></co>
<co c="0"><na f="e/Engel:Kristen" pid="292/6074">Kristen Engel</na></co>
<co c="0"><na f="e/Everspaugh:Adam" pid="26/4437">Adam Everspaugh</na></co>
<co c="0"><na f="f/F=aacute=brega:Andr=eacute=s" pid="333/8848">Andr&#233;s F&#225;brega</na></co>
<co c="0"><na f="f/Farley:Benjamin" pid="119/7711">Benjamin Farley</na></co>
<co c="0"><na f="f/Fischlin:Marc" pid="72/5460">Marc Fischlin</na></co>
<co c="0"><na f="f/Fisher:Alexis" pid="143/5691">Alexis Fisher</na></co>
<co c="0" n="2"><na f="f/Fredrikson:Matt" pid="38/2612">Matt Fredrikson</na><na>Matthew Fredrikson</na></co>
<co c="0"><na f="f/Freed:Diana" pid="175/1690">Diana Freed</na></co>
<co c="0"><na f="f/Frisby:WesLee" pid="121/1111">WesLee Frisby</na></co>
<co c="0"><na f="g/Gallardo:Andrea" pid="252/4310">Andrea Gallardo</na></co>
<co c="0"><na f="g/Ganesh:Chaya" pid="115/4391">Chaya Ganesh</na></co>
<co c="0"><na f="g/Garcia:Ryan" pid="381/1602">Ryan Garcia</na></co>
<co c="0"><na f="g/Gember:Aaron" pid="07/9556">Aaron Gember</na></co>
<co c="0"><na f="g/Gerhart:Paul" pid="350/5886">Paul Gerhart</na></co>
<co c="0"><na f="g/Golovnev:Alexander" pid="31/11062">Alexander Golovnev</na></co>
<co c="0"><na f="g/Green_0001:Matthew" pid="74/4531-1">Matthew Green 0001</na></co>
<co c="0"><na f="g/Greenstadt:Rachel" pid="93/655">Rachel Greenstadt</na></co>
<co c="0"><na f="g/Grimmelmann:James" pid="54/1653">James Grimmelmann</na></co>
<co c="0"><na f="g/Grubbs:Paul" pid="139/2372">Paul Grubbs</na></co>
<co c="0"><na f="g/Gueron:Shay" pid="38/1135">Shay Gueron</na></co>
<co c="0"><na f="h/Havron:Sam" pid="224/2332">Sam Havron</na></co>
<co c="0"><na f="h/He:Keqiang" pid="95/1050">Keqiang He</na></co>
<co c="0"><na f="h/Hoang:Viet_Tung" pid="12/1662">Viet Tung Hoang</na></co>
<co c="0"><na f="h/Hsu:Francis" pid="92/3473">Francis Hsu</na></co>
<co c="0"><na f="h/Hua:Yiqing" pid="163/3603">Yiqing Hua</na></co>
<co c="0"><na f="i/Islam_0002:Mazharul" pid="208/1920-2">Mazharul Islam 0002</na></co>
<co c="0"><na f="j/Jaeger:Joseph" pid="153/9914">Joseph Jaeger</na></co>
<co c="0"><na f="j/Jegan:Deepak_Sirone" pid="278/2709">Deepak Sirone Jegan</na></co>
<co c="0"><na f="j/Jellinek:Robert" pid="150/5888">Robert Jellinek</na></co>
<co c="0"><na f="j/Jha:Somesh" pid="j/SomeshJha">Somesh Jha</na></co>
<co c="0"><na f="j/Juels:Ari" pid="j/AriJuels">Ari Juels</na></co>
<co c="0"><na f="k/Keelveedhi:Sriram" pid="53/9958">Sriram Keelveedhi</na></co>
<co c="0"><na f="k/Kelley:Patrick_Gage" pid="15/3631">Patrick Gage Kelley</na></co>
<co c="0"><na f="k/Khandelwal:Anurag" pid="162/1936">Anurag Khandelwal</na></co>
<co c="0"><na f="k/Kirda:Engin" pid="k/EnginKirda">Engin Kirda</na></co>
<co c="0"><na f="k/Knockel:Jeffrey" pid="41/11468">Jeffrey Knockel</na></co>
<co c="0"><na f="k/Kohno:Tadayoshi" pid="k/TadayoshiKohno">Tadayoshi Kohno</na></co>
<co c="0"><na f="k/Kooburat:Thawan" pid="18/10369">Thawan Kooburat</na></co>
<co c="0"><na f="k/Krishnamurthy:Arvind" pid="k/AKrishnamurthy">Arvind Krishnamurthy</na></co>
<co c="0"><na f="k/Kumar:Akshaya" pid="339/2029">Akshaya Kumar</na></co>
<co c="0"><na f="k/Kumar_0006:Deepak" pid="66/3984-6">Deepak Kumar 0006</na></co>
<co c="0"><na f="l/Lacharit=eacute=:Marie=Sarah" pid="172/4062">Marie-Sarah Lacharit&#233;</na></co>
<co c="0"><na f="l/Lange_0001:Tanja" pid="56/2224">Tanja Lange 0001</na></co>
<co c="0"><na f="l/Lantz:Eric" pid="02/1072">Eric Lantz</na></co>
<co c="0"><na f="l/Lee_0001:Kevin" pid="44/765-1">Kevin Lee 0001</na></co>
<co c="0"><na f="l/Lee:Yeuk=Yu" pid="381/1776">Yeuk-Yu Lee</na></co>
<co c="0"><na f="l/Lehmann:Anja" pid="63/3592">Anja Lehmann</na></co>
<co c="0"><na f="l/Len:Julia" pid="207/6590">Julia Len</na></co>
<co c="0"><na f="l/Levy:Karen" pid="16/10897">Karen Levy</na></co>
<co c="0"><na f="l/Li_0003:Jason" pid="12/975-3">Jason Li 0003</na></co>
<co c="0"><na f="l/Li:Lucy" pid="174/9518">Lucy Li</na></co>
<co c="0"><na f="l/Li_0004:Mengyuan" pid="157/4437-4">Mengyuan Li 0004</na></co>
<co c="0"><na f="l/Lin:Simon_M=" pid="35/5195">Simon M. Lin</na></co>
<co c="0"><na f="l/Lu:Jiahui" pid="96/939">Jiahui Lu</na></co>
<co c="0"><na f="l/Luchaup:Daniel" pid="17/7429">Daniel Luchaup</na></co>
<co c="0"><na f="m/Maganis:Gabriel" pid="66/2982">Gabriel Maganis</na></co>
<co c="0"><na f="m/Malach:Eran" pid="202/2566">Eran Malach</na></co>
<co c="0"><na f="m/Maskiewicz:Jake" pid="150/5411">Jake Maskiewicz</na></co>
<co c="0"><na f="m/Matthews:Tara" pid="57/1705">Tara Matthews</na></co>
<co c="0"><na f="m/Mazurek:Michelle_L=" pid="20/7983">Michelle L. Mazurek</na></co>
<co c="0"><na f="m/McCoy:Damon" pid="58/4016">Damon McCoy</na></co>
<co c="0"><na f="m/McDonald:Allison" pid="205/2107">Allison McDonald</na></co>
<co c="0"><na f="m/McDonald:Nora" pid="128/9352">Nora McDonald</na></co>
<co c="0"><na f="m/McPherson:Richard" pid="134/8738">Richard McPherson</na></co>
<co c="0"><na f="m/Meiklejohn:Sarah" pid="94/8813">Sarah Meiklejohn</na></co>
<co c="0"><na f="m/Menda:Sanketh" pid="213/7956">Sanketh Menda</na></co>
<co c="0"><na f="m/Mendelberg:Paula_Barmaimon" pid="272/8310">Paula Barmaimon Mendelberg</na></co>
<co c="0"><na f="m/Micciancio:Daniele" pid="03/3331">Daniele Micciancio</na></co>
<co c="0"><na f="m/Miers:Ian" pid="129/9500">Ian Miers</na></co>
<co c="0"><na f="m/Minchala:Diana_Elizabeth" pid="212/2989">Diana Elizabeth Minchala</na></co>
<co c="0"><na f="m/Moench:Benjamin" pid="121/1116">Benjamin Moench</na></co>
<co c="0"><na f="m/Mughees:Muhammad_Haris" pid="180/5609">Muhammad Haris Mughees</na></co>
<co c="0"><na f="n/Naaman:Mor" pid="42/241">Mor Naaman</na></co>
<co c="0"><na f="n/Namavari:Armin" pid="301/5856">Armin Namavari</na></co>
<co c="0"><na f="n/Naor:Moni" pid="n/MoniNaor">Moni Naor</na></co>
<co c="0"><na f="n/Nappa:Antonio" pid="20/8280">Antonio Nappa</na></co>
<co c="0"><na f="n/Narakornpichit:Julia" pid="301/5898">Julia Narakornpichit</na></co>
<co c="0"><na f="n/Nassi:Ben" pid="192/2096">Ben Nassi</na></co>
<co c="0"><na f="n/Naveed_0001:Muhammad" pid="120/9715-1">Muhammad Naveed 0001</na></co>
<co c="0"><na f="n/Niederhagen:Ruben" pid="62/7604">Ruben Niederhagen</na></co>
<co c="0"><na f="n/Nissani:Daniel" pid="272/8280">Daniel Nissani</na></co>
<co c="0"><na f="o/O=Neill:Adam" pid="55/3477">Adam O'Neill</na></co>
<co c="0"><na f="o/Orgad:Hadas" pid="224/2323">Hadas Orgad</na></co>
<co c="0"><na f="p/Page:David" pid="p/DavidPage">David Page</na></co>
<co c="0"><na f="p/Pal:Bijeeta" pid="241/9681">Bijeeta Pal</na></co>
<co c="0"><na f="p/Palmer:Jackeline" pid="212/2685">Jackeline Palmer</na></co>
<co c="0"><na f="p/Pass:Rafael" pid="p/RPass">Rafael Pass</na></co>
<co c="0"><na f="p/Paterson:Kenneth_G=" pid="39/780">Kenneth G. Paterson</na></co>
<co c="0"><na f="p/P=eacute=rez:Carolina_Ortega" pid="385/6919">Carolina Ortega P&#233;rez</na></co>
<co c="0"><na f="p/Perry:Jason" pid="130/6989">Jason Perry</na></co>
<co c="0"><na f="p/Pnueli:Yuval" pid="207/6584">Yuval Pnueli</na></co>
<co c="0"><na f="p/Pustogarov:Ivan" pid="47/8436">Ivan Pustogarov</na></co>
<co c="0" n="2"><na f="r/Ramjit:Lana" pid="252/6200">Lana Ramjit</na><na>Alana Ramjit</na></co>
<co c="0"><na f="r/Recht:Benjamin" pid="r/BenRecht">Benjamin Recht</na></co>
<co c="0"><na f="r/Reiter:Michael_K=" pid="r/MichaelKReiter">Michael K. Reiter</na></co>
<co c="0"><na f="r/Ribeiro:Manoel_Horta" pid="193/5425">Manoel Horta Ribeiro</na></co>
<co c="0"><na f="r/Rogaway:Phillip" pid="r/PhillipRogaway">Phillip Rogaway</na></co>
<co c="0"><na f="r/Rossi_0001:Francesca" pid="r/FrancescaRossi">Francesca Rossi 0001</na></co>
<co c="0"><na f="r/Roundy:Kevin_A=" pid="36/8412">Kevin A. Roundy</na></co>
<co c="0"><na f="r/Rubin:Gregory" pid="423/3664">Gregory Rubin</na></co>
<co c="0"><na f="s/Sabet:Mehrnaz" pid="292/6028">Mehrnaz Sabet</na></co>
<co c="0"><na f="s/Savage:Stefan" pid="s/StefanSavage">Stefan Savage</na></co>
<co c="0"><na f="s/Schaub:Florian" pid="08/7562">Florian Schaub</na></co>
<co c="0"><na f="s/Schneier:Bruce" pid="s/BruceSchneier">Bruce Schneier</na></co>
<co c="0"><na f="s/Schuster:Roei" pid="180/8190">Roei Schuster</na></co>
<co c="0"><na f="s/Scott:Samuel" pid="165/8373">Samuel Scott</na></co>
<co c="0"><na f="s/Segev_0001:Gil" pid="s/GilSegev">Gil Segev 0001</na></co>
<co c="0"><na f="s/Sekar:Vyas" pid="45/4044">Vyas Sekar</na></co>
<co c="0"><na f="s/Sekniqi:Kevin" pid="187/5561">Kevin Sekniqi</na></co>
<co c="0"><na f="s/Shacham:Hovav" pid="35/1061">Hovav Shacham</na></co>
<co c="0"><na f="s/Shaffer:Jeremy" pid="32/2635">Jeremy Shaffer</na></co>
<co c="0"><na f="s/Shafran:Avital" pid="254/2733">Avital Shafran</na></co>
<co c="0"><na f="s/Shelat:Abhi" pid="s/AShelat">Abhi Shelat</na></co>
<co c="0"><na f="s/Shmatikov:Vitaly" pid="46/6275">Vitaly Shmatikov</na></co>
<co c="0"><na f="s/Shrimpton:Thomas" pid="s/ThomasShrimpton">Thomas Shrimpton</na></co>
<co c="0"><na f="s/Singh:Vikas" pid="26/1810">Vikas Singh</na></co>
<co c="0"><na f="s/Sodhi:Harkiran_Kaur" pid="319/3858">Harkiran Kaur Sodhi</na></co>
<co c="0"><na f="s/Song:Congzheng" pid="186/8335">Congzheng Song</na></co>
<co c="0"><na f="s/Specter:Michael_A=" pid="169/8186">Michael A. Specter</na></co>
<co c="0"><na f="s/Stam:Martijn" pid="82/4585">Martijn Stam</na></co>
<co c="0"><na f="s/Stegers:Till" pid="63/6123">Till Stegers</na></co>
<co c="0"><na f="s/Steinberger:John_P=" pid="87/1608">John P. Steinberger</na></co>
<co c="0"><na f="s/Stephenson:Sophie" pid="325/3688">Sophie Stephenson</na></co>
<co c="0"><na f="s/Stringhini:Gianluca" pid="86/8823">Gianluca Stringhini</na></co>
<co c="0"><na f="s/Su_0001:Zhendong" pid="s/ZhendongSu">Zhendong Su 0001</na></co>
<co c="0"><na f="s/Sullivan:Nick" pid="172/5512">Nick Sullivan</na></co>
<co c="0"><na f="s/Swift:Michael_M=" pid="s/MichaelMSwift">Michael M. Swift</na></co>
<co c="0"><na f="t/Tamersoy:Acar" pid="79/9389">Acar Tamersoy</na></co>
<co c="0"><na f="t/Tang_0005:Qiang" pid="17/2212-5">Qiang Tang 0005</na></co>
<co c="0"><na f="t/Tessaro:Stefano" pid="38/937">Stefano Tessaro</na></co>
<co c="0"><na f="t/Thomas:Kurt" pid="68/8283">Kurt Thomas</na></co>
<co c="0"><na f="t/Tram=egrave=r:Florian" pid="158/7224">Florian Tram&#232;r</na></co>
<co c="0"><na f="t/Tromer:Eran" pid="t/EranTromer">Eran Tromer</na></co>
<co c="0"><na f="t/Tseng:Emily" pid="245/6107">Emily Tseng</na></co>
<co c="0"><na f="t/Tyagi:Nirvan" pid="174/4813">Nirvan Tyagi</na></co>
<co c="0"><na f="v/Vadhan:Salil_P=" pid="v/SPVadhan">Salil P. Vadhan</na></co>
<co c="0"><na f="v/Valenta:Luke" pid="166/6979">Luke Valenta</na></co>
<co c="0"><na f="v/Varadarajan:Venkatanathan" pid="17/8064">Venkatanathan Varadarajan</na></co>
<co c="0"><na f="v/Voelker:Geoffrey_M=" pid="v/GeoffreyMVoelker">Geoffrey M. Voelker</na></co>
<co c="0"><na f="w/Wang:Barry" pid="320/5158">Barry Wang</na></co>
<co c="0"><na f="w/Wang_0023:Liang" pid="56/4499-23">Liang Wang 0023</na></co>
<co c="0"><na f="w/Warford:Noel" pid="239/0184">Noel Warford</na></co>
<co c="0"><na f="w/West_0001:Robert" pid="20/7441-1">Robert West 0001</na></co>
<co c="0"><na f="w/Whalen:Tara" pid="18/300">Tara Whalen</na></co>
<co c="0"><na f="w/Wilder:Jacob" pid="419/0657">Jacob Wilder</na></co>
<co c="0"><na f="w/Woelfer:Jill_Palzkill" pid="14/2453">Jill Palzkill Woelfer</na></co>
<co c="0"><na f="w/Wood:Christopher_A=" pid="163/1886">Christopher A. Wood</na></co>
<co c="0"><na f="w/Woodage:Joanne" pid="181/1576">Joanne Woodage</na></co>
<co c="0"><na f="w/Wu:Hao" pid="72/4250">Hao Wu</na></co>
<co c="0"><na f="x/Xu:Min" pid="09/0">Min Xu</na></co>
<co c="0"><na f="y/Yarom:Yuval" pid="90/10901">Yuval Yarom</na></co>
<co c="0"><na f="y/Yilek:Scott" pid="93/5760">Scott Yilek</na></co>
<co c="0"><na f="y/Yin:Lichao" pid="185/9393">Lichao Yin</na></co>
<co c="0"><na f="z/Zhai:Yan" pid="44/6741">Yan Zhai</na></co>
<co c="0"><na f="z/Zhang:Amy_X=" pid="133/8390">Amy X. Zhang</na></co>
<co c="0"><na f="z/Zhang_0022:Fan" pid="21/3626-22">Fan Zhang 0022</na></co>
<co c="0"><na f="z/Zhang_0012:Qing" pid="68/1429-12">Qing Zhang 0012</na></co>
<co c="0"><na f="z/Zhang:Yinqian" pid="77/3503">Yinqian Zhang</na></co>
<co c="0"><na f="z/Zou:Yixin" pid="218/0356">Yixin Zou</na></co>
</coauthors>
</dblpperson>

