Susan Landau

  • Tufts University, Boston, MA, USA
  • Worcester Polytechnic Institute, Department of Social Science and Policy Studies, MA, USA (former)
  • Sun Microsystem Laboratories, Burlington, MA, USA (former)
  • University of Massachusetts Amherst, Computer Science Department, MA, USA (former)
  • Wesleyan University Middletown, Mathematics Department, CT, USA (former)
  • Massachusetts Institute of Technology, Cambridge, MA, USA (PhD 1983)

According to our database1, Susan Landau authored at least 63 papers between 1984 and 2022.

Collaborative distances:



In proceedings 
PhD thesis 


Online presence:



The Development of a Crypto Policy Community: Diffie-Hellman's Impact on Public Policy.
Proceedings of the Democratizing Cryptography: The Work of Whitfield Diffie and Martin Hellman, 2022

Bugs in our Pockets: The Risks of Client-Side Scanning.
CoRR, 2021

Susan Landau, Tufts University.
Proceedings of the 30th USENIX Security Symposium, 2021

Categorizing Uses of Communications Metadata: Systematizing Knowledge and Presenting a Path for Privacy.
Proceedings of the NSPW '20: New Security Paradigms Workshop 2020, 2020

Programming programming languages, and analyzing Facebook's failure.
Commun. ACM, 2018

The Second Crypto War - What's Different Now.
Proceedings of the 27th USENIX Security Symposium, 2018

Limiting the undesired impact of cyber weapons: technical requirements and policy implications.
J. Cybersecur., 2017

Transactional information is remarkably revelatory.
Proc. Natl. Acad. Sci. USA, 2016

Is It Legal? Is It Right? The Can and Should of Use.
IEEE Secur. Priv., 2016

Insecure Surveillance: Technical Issues with Remote Computer Searches.
Computer, 2016

What Was Samsung Thinking?
IEEE Secur. Priv., 2015

Keys under doormats: mandating insecurity by requiring government access to all data and communications.
J. Cybersecur., 2015

Keys under doormats.
Commun. ACM, 2015

Mining the Metadata - and Its Consequences.
Proceedings of the 37th IEEE/ACM International Conference on Software Engineering, 2015

Security and Privacy: Facing Ethical Choices.
IEEE Secur. Priv., 2014

Highlights from Making Sense of Snowden, Part II: What's Significant in the NSA Revelations.
IEEE Secur. Priv., 2014

Summing up.
Commun. ACM, 2014

The Large Immortal Machine and the Ticking Time Bomb.
J. Telecommun. High Technol. Law, 2013

Making Sense from Snowden: What's Significant in the NSA Surveillance Revelations.
IEEE Secur. Priv., 2013

Politics, Love, and Death in a World of No Privacy.
IEEE Secur. Priv., 2013

Going Bright: Wiretapping without Weakening Communications Infrastructure.
IEEE Secur. Priv., 2013

Privacy and Cybersecurity: The Next 100 Years.
Proc. IEEE, 2012

Privacy: Front and Center.
IEEE Secur. Priv., 2012

Economic tussles in federated identity management.
First Monday, 2012

Timesharing Dexter.
Proceedings of the Logic and Program Semantics, 2012

As simple as possible - but not more so.
Commun. ACM, 2011

A computer scientist goes to washington: how to be effective in a world where facts are 10% of the equation.
Proceedings of the 42nd ACM technical symposium on Computer science education, 2011

Surveillance Or Security? The Risks Posed by New Wiretapping Technologies
MIT Press, ISBN: 9780262015301, 2011

The problem isn't attribution: it's multi-stage attacks.
Proceedings of the Re-Architecting the Internet Workshop, 2010

The NRC Takes on Data Mining, Behavioral Surveillance, and Privacy.
IEEE Secur. Priv., 2009

Communications surveillance: privacy and security at risk.
Commun. ACM, 2009

Achieving Privacy in a Federated Identity Management System.
Proceedings of the Financial Cryptography and Data Security, 2009

Privacy on the line: the politics of wiretapping and encryption.
SIGACT News, 2008

I'm Pc01002/SpringPeeper/ED288l.6; Who are You?
IEEE Secur. Priv., 2008

Security and Privacy Landscape in Emerging Technologies.
IEEE Secur. Priv., 2008

Risking Communications Security: Potential Hazards of the Protect America Act.
IEEE Secur. Priv., 2008

Privacy and security: A multidimensional problem.
Commun. ACM, 2008

Internal surveillance, external risks.
Commun. ACM, 2007

Privacy on the line - the politics of wiretapping and encryption (updated expanded ed.).
MIT Press, ISBN: 978-0-262-04240-6, 2007

National Security on the Line.
J. Telecommun. High Technol. Law, 2006

Consumers, fans, and control: what the games industry can teach Hollywood about DRM.
Proceedings of the Sixth ACM Workshop on Digital Rights Management, 2006

Overview of Cyber Security: A Crisis of Prioritization.
IEEE Secur. Priv., 2005

Security, Wiretapping, and the Internet.
IEEE Secur. Priv., 2005

What lessons are we teaching?
Commun. ACM, 2005

The real national-security needs for VoIP.
Commun. ACM, 2005

Polynomials in the Nation's Service: Using Algebra to Design the Advanced Encryption Standard.
Am. Math. Mon., 2004

Security, Liberty, and Electronic Communications.
Proceedings of the Advances in Cryptology, 2004

Embedding Linkages on an Integer Lattice.
Algorithmica, 2002

Designing Cryptography for the New Century.
Commun. ACM, 2000

Decomposition of Algebraic Functions.
J. Symb. Comput., 1996

The Complexity of Iterated Multiplication
Inf. Comput., January, 1995

Crypto Policy Perspectives.
Commun. ACM, 1994

Finding maximal subfields.
SIGSAM Bull., 1993

Simplification of Nested Radicals.
SIAM J. Comput., 1992

A Note on "Zippel Denesting".
J. Symb. Comput., 1992

Erratum: Factoring Polynomials Over Algebraic Number Fields.
SIAM J. Comput., 1991

Shrinking Lattice Polyhedra.
SIAM J. Discret. Math., 1990

Polynomial Decomposition Algorithms.
J. Symb. Comput., 1989

Some Remarks on Computing the Square Parts of Integers
Inf. Comput., September, 1988

Functional Decomposition of Polynomials
Proceedings of the 28th Annual Symposium on Foundations of Computer Science, 1987

Factoring Polynomials Over Algebraic Number Fields.
SIAM J. Comput., 1985

Solvability by Radicals is in Polynomial Time.
J. Comput. Syst. Sci., 1985

Polynomial Time Algorithms for Galois Groups.
Proceedings of the EUROSAM 84, 1984