Sarah Meiklejohn
Orcid: 0000-0001-5671-1395
According to our database1,
Sarah Meiklejohn
authored at least 72 papers
between 2010 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2025
Trusted Machine Learning Models Unlock Private Inference for Problems Currently Infeasible with Cryptography.
CoRR, January, 2025
IACR Cryptol. ePrint Arch., 2025
Supporting Human Raters with the Detection of Harmful Content Using Large Language Models.
Proceedings of the IEEE Symposium on Security and Privacy, 2025
Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security, 2025
2024
Understanding Help-Seeking and Help-Giving on Social Media for Image-Based Sexual Abuse.
Proceedings of the 33rd USENIX Security Symposium, 2024
Proceedings of the 2024 ACM on Internet Measurement Conference, 2024
2023
CoRR, 2023
One Server for the Price of Two: Simple and Fast Single-Server Private Information Retrieval.
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the Financial Cryptography and Data Security, 2023
Bingo: Adaptivity and Asynchrony in Verifiable Secret Sharing and Distributed Key Generation.
Proceedings of the Advances in Cryptology - CRYPTO 2023, 2023
2022
Bingo: Adaptively Secure Packed Asynchronous Verifiable Secret Sharing and Asynchronous Distributed Key Generation.
IACR Cryptol. ePrint Arch., 2022
Proceedings of the 31st USENIX Security Symposium, 2022
2021
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021
Proceedings of the PODC '21: ACM Symposium on Principles of Distributed Computing, 2021
Proceedings of the Financial Cryptography and Data Security, 2021
Proceedings of the Financial Cryptography and Data Security. FC 2021 International Workshops, 2021
SoK: Algorithmic Incentive Manipulation Attacks on Permissionless PoW Cryptocurrencies.
Proceedings of the Financial Cryptography and Data Security. FC 2021 International Workshops, 2021
Proceedings of the Advances in Cryptology - EUROCRYPT 2021, 2021
Proceedings of the DIS '21: Designing Interactive Systems Conference 2021, 2021
2020
CoRR, 2020
2019
Sonic: Zero-Knowledge SNARKs from Linear-Size Universal and Updateable Structured Reference Strings.
IACR Cryptol. ePrint Arch., 2019
IACR Cryptol. ePrint Arch., 2019
Proceedings of the 28th USENIX Security Symposium, 2019
Coconut: Threshold Issuance Selective Disclosure Credentials with Applications to Distributed Ledgers.
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019
Proceedings of the Financial Cryptography and Data Security, 2019
Sonic: Zero-Knowledge SNARKs from Linear-Size Universal and Updatable Structured Reference Strings.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019
Proceedings of the Advances in Cryptology - ASIACRYPT 2019, 2019
Proceedings of the 1st ACM Conference on Advances in Financial Technologies, 2019
Proceedings of the 1st ACM Conference on Advances in Financial Technologies, 2019
2018
IEEE Secur. Priv., 2018
Why is a Ravencoin Like a TokenDesk? An Exploration of Code Diversity in the Cryptocurrency Landscape.
CoRR, 2018
CoRR, 2018
Proceedings of the 27th USENIX Security Symposium, 2018
Proceedings of the Financial Cryptography and Data Security, 2018
Egalitarian Society or Benevolent Dictatorship: The State of Cryptocurrency Governance.
Proceedings of the Financial Cryptography and Data Security, 2018
Proceedings of the Data Privacy Management, Cryptocurrencies and Blockchain Technology, 2018
Proceedings of the Advances in Cryptology - CRYPTO 2018, 2018
2017
Proceedings of the Data Privacy Management, Cryptocurrencies and Blockchain Technology, 2017
2016
Proceedings of the 23rd Annual Network and Distributed System Security Symposium, 2016
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016
Proceedings of the Advances in Cryptology - ASIACRYPT 2016, 2016
2015
A Profitable Sub-prime Loan: Obtaining the Advantages of Composite Order in Prime-Order Bilinear Groups.
Proceedings of the Public-Key Cryptography - PKC 2015 - 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30, 2015
Proceedings of the Financial Cryptography and Data Security, 2015
2014
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2014
Proceedings of the 21st Annual Network and Distributed System Security Symposium, 2014
Proceedings of the Advances in Cryptology - EUROCRYPT 2014, 2014
Proceedings of the Advances in Cryptology - EUROCRYPT 2014, 2014
Rethinking Verifiably Encrypted Signatures: A Gap in Functionality and Potential Solutions.
Proceedings of the Topics in Cryptology - CT-RSA 2014, 2014
Proceedings of the IEEE 27th Computer Security Foundations Symposium, 2014
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014
2013
IACR Cryptol. ePrint Arch., 2013
Malleable Signatures: Complex Unary Transformations and Delegatable Anonymous Credentials.
IACR Cryptol. ePrint Arch., 2013
Proceedings of the Theory of Cryptography - 10th Theory of Cryptography Conference, 2013
Proceedings of the Public-Key Cryptography - PKC 2013 - 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, February 26, 2013
Proceedings of the 2013 Internet Measurement Conference, 2013
Proceedings of the Design, Automation and Test in Europe, 2013
2012
Proceedings of the Advances in Cryptology - EUROCRYPT 2012, 2012
2011
Proceedings of the 5th USENIX Workshop on Offensive Technologies, 2011
The Phantom Tollbooth: Privacy-Preserving Electronic Toll Collection in the Presence of Driver Collusion.
Proceedings of the 20th USENIX Security Symposium, 2011
2010
Review of an introduction to mathematical cryptography by Jeffrey Hoffstein, Jill Pipher, and Joseph Silverman Springer-Verlag, 2008.
SIGACT News, 2010
ZKPDL: A Language-Based System for Efficient Zero-Knowledge Proofs and Electronic Cash.
Proceedings of the 19th USENIX Security Symposium, 2010
Limitations on Transformations from Composite-Order to Prime-Order Groups: The Case of Round-Optimal Blind Signatures.
Proceedings of the Advances in Cryptology - ASIACRYPT 2010, 2010