Sarah Meiklejohn

According to our database1, Sarah Meiklejohn authored at least 64 papers between 2010 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Reaching consensus for asynchronous distributed key generation.
Distributed Comput., September, 2023

Robust, privacy-preserving, transparent, and auditable on-device blocklisting.
CoRR, 2023

Forsage: Anatomy of a Smart-Contract Pyramid Scheme.
Proceedings of the Financial Cryptography and Data Security, 2023

Bingo: Adaptivity and Asynchrony in Verifiable Secret Sharing and Distributed Key Generation.
Proceedings of the Advances in Cryptology - CRYPTO 2023, 2023

2022
SoK: SCT Auditing in Certificate Transparency.
Proc. Priv. Enhancing Technol., 2022

One Server for the Price of Two: Simple and Fast Single-Server Private Information Retrieval.
IACR Cryptol. ePrint Arch., 2022

ACORN: Input Validation for Secure Aggregation.
IACR Cryptol. ePrint Arch., 2022

Bingo: Adaptively Secure Packed Asynchronous Verifiable Secret Sharing and Asynchronous Distributed Key Generation.
IACR Cryptol. ePrint Arch., 2022

How to Peel a Million: Validating and Expanding Bitcoin Clusters.
Proceedings of the 31st USENIX Security Symposium, 2022

2021
Aggregatable Distributed Key Generation.
IACR Cryptol. ePrint Arch., 2021

SoK: Hate, Harassment, and the Changing Landscape of Online Abuse.
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021

An Empirical Analysis of Privacy in the Lightning Network.
Proceedings of the Financial Cryptography and Data Security, 2021

Pay to Win: Cheap, Cross-Chain Bribing Attacks on PoW Cryptocurrencies.
Proceedings of the Financial Cryptography and Data Security. FC 2021 International Workshops, 2021

Problematising Transparency Through LARP And Deliberation.
Proceedings of the DIS '21: Designing Interactive Systems Conference 2021, 2021

2020
Reputable List Curation from Decentralized Voting.
Proc. Priv. Enhancing Technol., 2020

SoK: Algorithmic Incentive Manipulation Attacks on Permissionless PoW Cryptocurrencies.
IACR Cryptol. ePrint Arch., 2020

Think Global, Act Local: Gossip and Client Audits in Verifiable Data Structures.
CoRR, 2020

2019
Sonic: Zero-Knowledge SNARKs from Linear-Size Universal and Updateable Structured Reference Strings.
IACR Cryptol. ePrint Arch., 2019

Pay-To-Win: Incentive Attacks on Proof-of-Work Cryptocurrencies.
IACR Cryptol. ePrint Arch., 2019

Tracing Transactions Across Cryptocurrency Ledgers.
Proceedings of the 28th USENIX Security Symposium, 2019

Coconut: Threshold Issuance Selective Disclosure Credentials with Applications to Distributed Ledgers.
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019

Short Paper: An Exploration of Code Diversity in the Cryptocurrency Landscape.
Proceedings of the Financial Cryptography and Data Security, 2019

Sonic: Zero-Knowledge SNARKs from Linear-Size Universal and Updatable Structured Reference Strings.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

SoK: Consensus in the Age of Blockchains.
Proceedings of the 1st ACM Conference on Advances in Financial Technologies, 2019

2018
Möbius: Trustless Tumbling for Transaction Privacy.
Proc. Priv. Enhancing Technol., 2018

Top Ten Obstacles along Distributed Ledgers Path to Adoption.
IEEE Secur. Priv., 2018

Smart contracts for bribing miners.
IACR Cryptol. ePrint Arch., 2018

Pisa: Arbitration Outsourcing for State Channels.
IACR Cryptol. ePrint Arch., 2018

Updatable and Universal Common Reference Strings with Applications to zk-SNARKs.
IACR Cryptol. ePrint Arch., 2018

QuisQuis: A New Design for Anonymous Cryptocurrencies.
IACR Cryptol. ePrint Arch., 2018

Why is a Ravencoin Like a TokenDesk? An Exploration of Code Diversity in the Cryptocurrency Landscape.
CoRR, 2018

Betting on Blockchain Consensus with Fantomette.
CoRR, 2018

VAMS: Verifiable Auditing of Access to Confidential Data.
CoRR, 2018

Winning the Caucus Race: Continuous Leader Election via Public Randomness.
CoRR, 2018

An Empirical Analysis of Anonymity in Zcash.
Proceedings of the 27th USENIX Security Symposium, 2018

Egalitarian Society or Benevolent Dictatorship: The State of Cryptocurrency Governance.
Proceedings of the Financial Cryptography and Data Security, 2018

Contour: A Practical System for Binary Transparency.
Proceedings of the Data Privacy Management, Cryptocurrencies and Blockchain Technology, 2018

2017
Consensus in the Age of Blockchains.
CoRR, 2017

Who Am I? Secure Identity Registration on Distributed Ledgers.
Proceedings of the Data Privacy Management, Cryptocurrencies and Blockchain Technology, 2017

2016
Deja Q All Over Again: Tighter and Broader Reductions of q-Type Assumptions.
IACR Cryptol. ePrint Arch., 2016

Transparency Overlays and Applications.
IACR Cryptol. ePrint Arch., 2016

2015
Centrally Banked Cryptocurrencies.
IACR Cryptol. ePrint Arch., 2015

Privacy-Enhancing Overlays in Bitcoin.
Proceedings of the Financial Cryptography and Data Security, 2015

2014
Flexible Models for Secure Systems.
PhD thesis, 2014

Leveraging Gate-Level Properties to Identify Hardware Timing Channels.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2014

Deja Q: Using Dual Systems to Revisit q-Type Assumptions.
IACR Cryptol. ePrint Arch., 2014

Botcoin: Monetizing Stolen Cycles.
Proceedings of the 21st Annual Network and Distributed System Security Symposium, 2014

Rethinking Verifiably Encrypted Signatures: A Gap in Functionality and Potential Solutions.
Proceedings of the Topics in Cryptology - CT-RSA 2014, 2014

Malleable Signatures: New Definitions and Delegatable Anonymous Credentials.
Proceedings of the IEEE 27th Computer Security Foundations Symposium, 2014

Algebraic MACs and Keyed-Verification Anonymous Credentials.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

2013
A Fistful of Bitcoins: Characterizing Payments Among Men with No Names.
login Usenix Mag., 2013

New Trapdoor Projection Maps for Composite-Order Bilinear Groups.
IACR Cryptol. ePrint Arch., 2013

A Profitable Sub-Prime Loan: Obtaining the Advantages of Composite-Order in Prime-Order Bilinear Groups.
IACR Cryptol. ePrint Arch., 2013

Malleable Signatures: Complex Unary Transformations and Delegatable Anonymous Credentials.
IACR Cryptol. ePrint Arch., 2013

Key-Versatile Signatures and Applications: RKA, KDM and Joint Enc/Sig.
IACR Cryptol. ePrint Arch., 2013

A practical testing framework for isolating hardware timing channels.
Proceedings of the Design, Automation and Test in Europe, 2013

2012
ZKPDL: A Language-Based System for Efficient Zero-Knowledge Proofs and Electronic Cash.
IACR Cryptol. ePrint Arch., 2012

Verifiable Elections That Scale for Free.
IACR Cryptol. ePrint Arch., 2012

Succinct Malleable NIZKs and an Application to Compact Shuffles.
IACR Cryptol. ePrint Arch., 2012

Malleable Proof Systems and Applications.
IACR Cryptol. ePrint Arch., 2012

2011
Heat of the Moment: Characterizing the Efficacy of Thermal Camera-Based Attacks.
Proceedings of the 5th USENIX Workshop on Offensive Technologies, 2011

The Phantom Tollbooth: Privacy-Preserving Electronic Toll Collection in the Presence of Driver Collusion.
Proceedings of the 20th USENIX Security Symposium, 2011

2010
Review of an introduction to mathematical cryptography by Jeffrey Hoffstein, Jill Pipher, and Joseph Silverman Springer-Verlag, 2008.
SIGACT News, 2010

Limitations on Transformations from Composite-Order to Prime-Order Groups: The Case of Round-Optimal Blind Signatures.
IACR Cryptol. ePrint Arch., 2010


  Loading...