Ari Juels

According to our database1, Ari Juels authored at least 147 papers between 1995 and 2022.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2022
Strategic Latency Reduction in Blockchain Peer-to-Peer Networks.
CoRR, 2022

2021
GoAT: File Geolocation via Anchor Timestamping.
IACR Cryptol. ePrint Arch., 2021

Themis: Fast, Strong Order-Fairness in Byzantine Consensus.
IACR Cryptol. ePrint Arch., 2021

Clockwork Finance: Automated Analysis of Economic Security in Smart Contracts.
IACR Cryptol. ePrint Arch., 2021

Forsage: Anatomy of a Smart-Contract Pyramid Scheme.
CoRR, 2021

SquirRL: Automating Attack Analysis on Blockchain Incentive Mechanisms with Deep Reinforcement Learning.
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021

2020
The Ekiden Platform for Confidentiality-Preserving, Trustworthy, and Performant Smart Contracts.
IEEE Secur. Priv., 2020

CanDID: Can-Do Decentralized Identity with Legacy Compatibility, Sybil-Resistance, and Accountability.
IACR Cryptol. ePrint Arch., 2020

Order-Fairness for Byzantine Consensus.
IACR Cryptol. ePrint Arch., 2020

Flash Boys 2.0: Frontrunning in Decentralized Exchanges, Miner Extractable Value, and Consensus Instability.
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020

DECO: Liberating Web Data Using Decentralized Oracles for TLS.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020

BDoS: Blockchain Denial-of-Service.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020

2019
Secure Brokered Delegation Through DelegaTEE.
IEEE Secur. Priv., 2019

The Hydra Framework for Principled, Automated Bug Bounties.
IEEE Secur. Priv., 2019

CHURP: Dynamic-Committee Proactive Secret Sharing.
IACR Cryptol. ePrint Arch., 2019

Multisketches: Practical Secure Sketches Using Off-the-Shelf Biometric Matching Algorithms.
IACR Cryptol. ePrint Arch., 2019

SquirRL: Automating Attack Discovery on Blockchain Incentive Mechanisms with Deep Reinforcement Learning.
CoRR, 2019

DECO: Liberating Web Data Using Decentralized Oracles for TLS.
CoRR, 2019

Flash Boys 2.0: Frontrunning, Transaction Reordering, and Consensus Instability in Decentralized Exchanges.
CoRR, 2019

PIEs: Public Incompressible Encodings for Decentralized Storage.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

Tesseract: Real-Time Cryptocurrency Exchange Using Trusted Hardware.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

Paralysis Proofs: Secure Dynamic Access Structures for Cryptocurrency Custody and More.
Proceedings of the 1st ACM Conference on Advances in Financial Technologies, 2019

2018
Paralysis Proofs: Safe Access-Structure Updates for Cryptocurrencies and More.
IACR Cryptol. ePrint Arch., 2018

DelegaTEE: Brokered Delegation Using Trusted Execution Environments.
IACR Cryptol. ePrint Arch., 2018

PIEs: Public Incompressible Encodings for Decentralized Storage.
IACR Cryptol. ePrint Arch., 2018

Ekiden: A Platform for Confidentiality-Preserving, Trustworthy, and Performant Smart Contract Execution.
CoRR, 2018

2017
Rethinking Security in the Era of Cloud Computing.
IEEE Secur. Priv., 2017

REM: Resource-Efficient Mining for Blockchains.
IACR Cryptol. ePrint Arch., 2017

A New Distribution Sensitive Secure Sketch and a Comparison Between Approaches to Typo-Tolerant Authentication.
IACR Cryptol. ePrint Arch., 2017

ROTE: Rollback Protection for Trusted Execution.
IACR Cryptol. ePrint Arch., 2017

Solidus: Confidential Distributed Ledger Transactions via PVORM.
IACR Cryptol. ePrint Arch., 2017

Enter the Hydra: Towards Principled Bug Bounties and Exploit-Resistant Smart Contracts.
IACR Cryptol. ePrint Arch., 2017

Tesseract: Real-Time Cryptocurrency Exchange using Trusted Hardware.
IACR Cryptol. ePrint Arch., 2017

(Short Paper) PieceWork: Generalized Outsourcing Control for Proofs of Work.
Proceedings of the Financial Cryptography and Data Security, 2017

FairTest: Discovering Unwarranted Associations in Data-Driven Applications.
Proceedings of the 2017 IEEE European Symposium on Security and Privacy, 2017

A New Distribution-Sensitive Secure Sketch and Popularity-Proportional Hashing.
Proceedings of the Advances in Cryptology - CRYPTO 2017, 2017

2016
Town Crier: An Authenticated Data Feed for Smart Contracts.
IACR Cryptol. ePrint Arch., 2016

Sealed-Glass Proofs: Using Transparent Enclaves to Prove and Sell Knowledge.
IACR Cryptol. ePrint Arch., 2016

The Ring of Gyges: Investigating the Future of Criminal Smart Contracts.
IACR Cryptol. ePrint Arch., 2016

A Formal Treatment of Backdoored Pseudorandom Generators.
IACR Cryptol. ePrint Arch., 2016

Privacy is dead, long live privacy.
Commun. ACM, 2016

Stealing Machine Learning Models via Prediction APIs.
Proceedings of the 25th USENIX Security Symposium, 2016

pASSWORD tYPOS and How to Correct Them Securely.
Proceedings of the IEEE Symposium on Security and Privacy, 2016

Setting Standards for Altering and Undoing Smart Contracts.
Proceedings of the Rule Technologies. Research, Tools, and Applications, 2016

On Scaling Decentralized Blockchains - (A Position Paper).
Proceedings of the Financial Cryptography and Data Security, 2016

2015
The Pythia PRF Service.
IACR Cryptol. ePrint Arch., 2015

Cracking-Resistant Password Vaults using Natural Language Encoders.
IACR Cryptol. ePrint Arch., 2015

Discovering Unwarranted Associations in Data-Driven Applications with the FairTest Testing Toolkit.
CoRR, 2015

GenoGuard: Protecting Genomic Data against Brute-Force Attacks.
Proceedings of the 2015 IEEE Symposium on Security and Privacy, 2015

Falcon Codes: Fast, Authenticated LT Codes (Or: Making Rapid Tornadoes Unstoppable).
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

2014
Honey Encryption: Encryption beyond the Brute-Force Barrier.
IEEE Secur. Priv., 2014

Honey Encryption: Security Beyond the Brute-Force Bound.
IACR Cryptol. ePrint Arch., 2014

Falcon Codes: Fast, Authenticated LT Codes.
IACR Cryptol. ePrint Arch., 2014

The interplay of neuroscience and cryptography: technical perspective.
Commun. ACM, 2014

Permacoin: Repurposing Bitcoin Work for Data Preservation.
Proceedings of the 2014 IEEE Symposium on Security and Privacy, 2014

A bodyguard of lies: the use of honey objects in information security.
Proceedings of the 19th ACM Symposium on Access Control Models and Technologies, 2014

PillarBox: Combating Next-Generation Malware with Fast Forward-Secure Logging.
Proceedings of the Research in Attacks, Intrusions and Defenses, 2014

Cross-Tenant Side-Channel Attacks in PaaS Clouds.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

An Epidemiological Study of Malware Encounters in a Large Enterprise.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

2013
FlipIt: The Game of "Stealthy Takeover".
J. Cryptol., 2013

Securing the Data in Big Data Security Analytics.
IACR Cryptol. ePrint Arch., 2013

New approaches to security and availability for cloud data.
Commun. ACM, 2013

Tailing RFID Tags for Clone Detection.
Proceedings of the 20th Annual Network and Distributed System Security Symposium, 2013

Drifting Keys: Impersonation detection for constrained devices.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

Balancing security and utility in medical devices?
Proceedings of the 50th Annual Design Automation Conference 2013, 2013

Heart-to-heart (H2H): authentication for implanted medical devices.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

Honeywords: making password-cracking detectable.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

Fifth ACM cloud computing security workshop (CCSW 2013).
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

Beehive: large-scale log analysis for detecting suspicious activity in enterprise networks.
Proceedings of the Annual Computer Security Applications Conference, 2013

2012
Defending Against the Unknown Enemy: Applying FlipIt to System Security.
IACR Cryptol. ePrint Arch., 2012

Sherlock Holmes and the Case of the Advanced Persistent Threat.
Proceedings of the 5th USENIX Workshop on Large-Scale Exploits and Emergent Threats, 2012

More for your money: exploiting performance heterogeneity in public clouds.
Proceedings of the ACM Symposium on Cloud Computing, SOCC '12, 2012

Cross-VM side channels and their use to extract private keys.
Proceedings of the ACM Conference on Computer and Communications Security, 2012

Hourglass schemes: how to prove that cloud files are encrypted.
Proceedings of the ACM Conference on Computer and Communications Security, 2012

2011
Iris: A Scalable Cloud File System with Efficient Integrity Checks.
IACR Cryptol. ePrint Arch., 2011

HomeAlone: Co-residency Detection in the Cloud via Side-Channel Analysis.
Proceedings of the 32nd IEEE Symposium on Security and Privacy, 2011

Exploring implicit memory for painless password recovery.
Proceedings of the International Conference on Human Factors in Computing Systems, 2011

2010
On the Impossibility of Cryptography Alone for Privacy-Preserving Cloud Computing.
IACR Cryptol. ePrint Arch., 2010

How to Tell if Your Cloud Files Are Vulnerable to Drive Crashes.
IACR Cryptol. ePrint Arch., 2010

Future tense.
Commun. ACM, 2010

The Physical Basis of RFID Security.
Proceedings of the Radio Frequency Identification: Security and Privacy Issues, 2010

Biometrics in electronic travel documents.
Proceedings of the Multimedia and Security Workshop, 2010

A Clean-Slate Look at Disk Scrubbing.
Proceedings of the 8th USENIX Conference on File and Storage Technologies, 2010

2009
Defining strong privacy for RFID.
ACM Trans. Inf. Syst. Secur., 2009

CCCP: Secure Remote Storage for Computational RFIDs.
Proceedings of the 18th USENIX Security Symposium, 2009

Server-side detection of malware infection.
Proceedings of the 2009 Workshop on New Security Paradigms, 2009

Power games in RFID security.
Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, 2009

EPC RFID tag security weaknesses and defenses: passport cards, enhanced drivers licenses, and beyond.
Proceedings of the 2009 ACM Conference on Computer and Communications Security, 2009

2008
Unidirectional Key Distribution Across Time and Space with Applications to RFID Security.
IACR Cryptol. ePrint Arch., 2008

HAIL: A High-Availability and Integrity Layer for Cloud Storage.
IACR Cryptol. ePrint Arch., 2008

Proofs of Retrievability: Theory and Implementation.
IACR Cryptol. ePrint Arch., 2008

RFID security and privacy: long-term research or short-term tinkering?
Proceedings of the First ACM Conference on Wireless Network Security, 2008

RFID security: in the shoulder and on the loading dock.
Proceedings of the First ACM Conference on Wireless Network Security, 2008

2007
In Response to: Letter to the Editor Regarding: "A Security Analysis of the Verichip Implantable RFID Device".
J. Am. Medical Informatics Assoc., 2007

Combating Click Fraud via Premium Clicks.
Proceedings of the 16th USENIX Security Symposium, Boston, MA, USA, August 6-10, 2007, 2007

Cryptanalysis of Two Lightweight RFID Authentication Schemes.
Proceedings of the Fifth Annual IEEE International Conference on Pervasive Computing and Communications, 2007

Vulnerabilities in First-Generation RFID-enabled Credit Cards.
Proceedings of the Financial Cryptography and Data Security, 2007

Pors: proofs of retrievability for large files.
Proceedings of the 2007 ACM Conference on Computer and Communications Security, 2007

Covert channels in privacy-preserving identification systems.
Proceedings of the 2007 ACM Conference on Computer and Communications Security, 2007

Two-Party Computing with Encrypted Data.
Proceedings of the Advances in Cryptology, 2007

2006
RFID security and privacy: a research survey.
IEEE J. Sel. Areas Commun., 2006

Technology Evaluation: The Security Implications of VeriChip Cloning.
J. Am. Medical Informatics Assoc., 2006

A Fuzzy Vault Scheme.
Des. Codes Cryptogr., 2006

Cache Cookies for Browser Authentication (Extended Abstract).
Proceedings of the 2006 IEEE Symposium on Security and Privacy (S&P 2006), 2006

Shoehorning Security into the EPC Tag Standard.
Proceedings of the Security and Cryptography for Networks, 5th International Conference, 2006

The Outer Limits of RFID Security.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2006

Fourth-factor authentication: somebody you know.
Proceedings of the 13th ACM Conference on Computer and Communications Security, 2006

2005
RFID Privacy: An Overview of Problems and Proposed Solutions.
IEEE Secur. Priv., 2005

Security and Privacy Issues in E-passports.
IACR Cryptol. ePrint Arch., 2005

Strengthening EPC tags against cloning.
Proceedings of the 2005 ACM Workshop on Wireless Security, 2005

Security Analysis of a Cryptographically-Enabled RFID Device.
Proceedings of the 14th USENIX Security Symposium, Baltimore, MD, USA, July 31, 2005

High-Power Proxies for Enhancing RFID Privacy and Utility.
Proceedings of the Privacy Enhancing Technologies, 5th International Workshop, 2005

Authenticating Pervasive Devices with Human Protocols.
Proceedings of the Advances in Cryptology, 2005

2004
RFID: security and privacy for five-cent wireless devices.
Proceedings of the 2004 ACM Workshop on Wireless Security, 2004

Soft blocking: flexible blocker tags on the cheap.
Proceedings of the 2004 ACM Workshop on Privacy in the Electronic Society, 2004

RFID: Security and Privacy for Five-Cent Computers.
Proceedings of the 13th USENIX Security Symposium, August 9-13, 2004, San Diego, CA, USA, 2004

Minimalist Cryptography for Low-Cost RFID Tags.
Proceedings of the Security in Communication Networks, 4th International Conference, 2004

"Yoking-Proofs" for RFID Tags.
Proceedings of the 2nd IEEE Conference on Pervasive Computing and Communications Workshops (PerCom 2004 Workshops), 2004

Dining Cryptographers Revisited.
Proceedings of the Advances in Cryptology, 2004

Universal Re-encryption for Mixnets.
Proceedings of the Topics in Cryptology, 2004

New client puzzle outsourcing techniques for DoS resistance.
Proceedings of the 11th ACM Conference on Computer and Communications Security, 2004

Parallel mixing.
Proceedings of the 11th ACM Conference on Computer and Communications Security, 2004

2003
A New Two-Server Approach for Authentication with Short Secrets.
Proceedings of the 12th USENIX Security Symposium, Washington, D.C., USA, August 4-8, 2003, 2003

Squealing Euros: Privacy Protection in RFID-Enabled Banknotes.
Proceedings of the Financial Cryptography, 2003

The blocker tag: selective blocking of RFID tags for consumer privacy.
Proceedings of the 10th ACM Conference on Computer and Communications Security, 2003

2002
Coercion-Resistant Electronic Elections.
IACR Cryptol. ePrint Arch., 2002

Making Mix Nets Robust For Electronic Voting By Randomized Partial Checking.
IACR Cryptol. ePrint Arch., 2002

RSA Key Generation with Verifiable Randomness.
Proceedings of the Public Key Cryptography, 2002

A Two-Server, Sealed-Bid Auction Protocol.
Proceedings of the Financial Cryptography, 6th International Conference, 2002

Proprietary Certificates.
Proceedings of the Topics in Cryptology, 2002

Optimistic Mixing for Exit-Polls.
Proceedings of the Advances in Cryptology, 2002

2001
An optimally robust hybrid mix network.
Proceedings of the Twentieth Annual ACM Symposium on Principles of Distributed Computing, 2001

Targeted Advertising ... And Privacy Too.
Proceedings of the Topics in Cryptology, 2001

Error-tolerant password recovery.
Proceedings of the CCS 2001, 2001

2000
How to turn loaded dice into fair coins.
IEEE Trans. Inf. Theory, 2000

Hiding Cliques for Cryptographic Security.
Des. Codes Cryptogr., 2000

Funkspiel schemes: an alternative to conventional tamper resistance.
Proceedings of the CCS 2000, 2000

Addition of ElGamal Plaintexts.
Proceedings of the Advances in Cryptology, 2000

Mix and Match: Secure Function Evaluation via Ciphertexts.
Proceedings of the Advances in Cryptology, 2000

1999
Client Puzzles: A Cryptographic Countermeasure Against Connection Depletion Attacks.
Proceedings of the Network and Distributed System Security Symposium, 1999

Trustee Tokens: Simple and Practical Anonymous Digital Coin Tracing.
Proceedings of the Financial Cryptography, 1999

Proofs of Work and Bread Pudding Protocols.
Proceedings of the Secure Information Networks: Communications and Multimedia Security, 1999

A Fuzzy Commitment Scheme.
Proceedings of the CCS '99, 1999

1998
X-Cash: Executable Digital Cash.
Proceedings of the Financial Cryptography, 1998

A Practical Secure Physical Random Bit Generator.
Proceedings of the CCS '98, 1998

1997
Security of Blind Digital Signatures (Extended Abstract).
Proceedings of the Advances in Cryptology, 1997

1995
Stochastic Hillclimbing as a Baseline Mathod for Evaluating Genetic Algorithms.
Proceedings of the Advances in Neural Information Processing Systems 8, 1995


  Loading...