Thomas Ristenpart

According to our database1, Thomas Ristenpart authored at least 115 papers between 2006 and 2018.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepage:

On csauthors.net:

Bibliography

2018
The Tao of Inference in Privacy-Protected Databases.
PVLDB, 2018

Blind Certificate Authorities.
IACR Cryptology ePrint Archive, 2018

BurnBox: Self-Revocable Encryption in a World Of Compelled Access.
IACR Cryptology ePrint Archive, 2018

When Textbook RSA is Used to Protect the Privacy of Hundreds of Millions of Users.
CoRR, 2018

BurnBox: Self-Revocable Encryption in a World Of Compelled Access.
Proceedings of the 27th USENIX Security Symposium, 2018

Peeking Behind the Curtains of Serverless Platforms.
Proceedings of the 2018 USENIX Annual Technical Conference, 2018

The Spyware Used in Intimate Partner Violence.
Proceedings of the 2018 IEEE Symposium on Security and Privacy, 2018

Fast Message Franking: From Invisible Salamanders to Encryptment.
Proceedings of the Advances in Cryptology - CRYPTO 2018, 2018

"A Stalker's Paradise": How Intimate Partner Abusers Exploit Technology.
Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, 2018

2017
Digital Technologies and Intimate Partner Violence: A Qualitative Analysis with Multiple Stakeholders.
PACMHCI, 2017

Rethinking Security in the Era of Cloud Computing.
IEEE Security & Privacy, 2017

A New Distribution Sensitive Secure Sketch and a Comparison Between Approaches to Typo-Tolerant Authentication.
IACR Cryptology ePrint Archive, 2017

Modifying an Enciphering Scheme after Deployment.
IACR Cryptology ePrint Archive, 2017

Why Your Encrypted Database Is Not Secure.
IACR Cryptology ePrint Archive, 2017

Message Franking via Committing Authenticated Encryption.
IACR Cryptology ePrint Archive, 2017

Key Rotation for Authenticated Encryption.
IACR Cryptology ePrint Archive, 2017

The TypTop System: Personalized Typo-Tolerant Password Checking.
IACR Cryptology ePrint Archive, 2017

The Tao of Inference in Privacy-Protected Databases.
IACR Cryptology ePrint Archive, 2017

Machine Learning Models that Remember Too Much.
CoRR, 2017

Side-Channel Attacks on Shared Search Indexes.
Proceedings of the 2017 IEEE Symposium on Security and Privacy, 2017

Leakage-Abuse Attacks against Order-Revealing Encryption.
Proceedings of the 2017 IEEE Symposium on Security and Privacy, 2017

Why Your Encrypted Database Is Not Secure.
Proceedings of the 16th Workshop on Hot Topics in Operating Systems, 2017

Modifying an Enciphering Scheme After Deployment.
Proceedings of the Advances in Cryptology - EUROCRYPT 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30, 2017

A New Distribution-Sensitive Secure Sketch and Popularity-Proportional Hashing.
Proceedings of the Advances in Cryptology - CRYPTO 2017, 2017

Message Franking via Committing Authenticated Encryption.
Proceedings of the Advances in Cryptology - CRYPTO 2017, 2017

Key Rotation for Authenticated Encryption.
Proceedings of the Advances in Cryptology - CRYPTO 2017, 2017

Machine Learning Models that Remember Too Much.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, CCS 2017, Dallas, TX, USA, October 30, 2017

Using Program Analysis to Synthesize Sensor Spoofing Attacks.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017

The TypTop System: Personalized Typo-Tolerant Password Checking.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, CCS 2017, Dallas, TX, USA, October 30, 2017

2016
Network Traffic Obfuscation and Automated Internet Censorship.
IEEE Security & Privacy, 2016

Secure Channel Injection and Anonymous Proofs of Account Ownership.
IACR Cryptology ePrint Archive, 2016

Honey Encryption Beyond Message Recovery Security.
IACR Cryptology ePrint Archive, 2016

Leakage-Abuse Attacks against Order-Revealing Encryption.
IACR Cryptology ePrint Archive, 2016

Breaking Web Applications Built On Top of Encrypted Data.
IACR Cryptology ePrint Archive, 2016

A Formal Treatment of Backdoored Pseudorandom Generators.
IACR Cryptology ePrint Archive, 2016

Leakage-Abuse Attacks Against Searchable Encryption.
IACR Cryptology ePrint Archive, 2016

Stealing Machine Learning Models via Prediction APIs.
CoRR, 2016

Network Traffic Obfuscation and Automated Internet Censorship.
CoRR, 2016

Controlling UAVs with Sensor Input Spoofing Attacks.
Proceedings of the 10th USENIX Workshop on Offensive Technologies, 2016

Stealing Machine Learning Models via Prediction APIs.
Proceedings of the 25th USENIX Security Symposium, 2016

pASSWORD tYPOS and How to Correct Them Securely.
Proceedings of the IEEE Symposium on Security and Privacy, 2016

Honey Encryption Beyond Message Recovery Security.
Proceedings of the Advances in Cryptology - EUROCRYPT 2016, 2016

CQSTR: Securing Cross-Tenant Applications with Cloud Containers.
Proceedings of the Seventh ACM Symposium on Cloud Computing, 2016

Breaking Web Applications Built On Top of Encrypted Data.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

2015
Surreptitiously Weakening Cryptographic Systems.
IACR Cryptology ePrint Archive, 2015

The Pythia PRF Service.
IACR Cryptology ePrint Archive, 2015

Cracking-Resistant Password Vaults using Natural Language Encoders.
IACR Cryptology ePrint Archive, 2015

A Placement Vulnerability Study in Multi-tenant Public Clouds.
CoRR, 2015

A Placement Vulnerability Study in Multi-Tenant Public Clouds.
Proceedings of the 24th USENIX Security Symposium, 2015

The Pythia PRF Service.
Proceedings of the 24th USENIX Security Symposium, 2015

Cracking-Resistant Password Vaults Using Natural Language Encoders.
Proceedings of the 2015 IEEE Symposium on Security and Privacy, 2015

A Formal Treatment of Backdoored Pseudorandom Generators.
Proceedings of the Advances in Cryptology - EUROCRYPT 2015, 2015

Seeing through Network-Protocol Obfuscation.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

Model Inversion Attacks that Exploit Confidence Information and Basic Countermeasures.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

Leakage-Abuse Attacks Against Searchable Encryption.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

2014
Honey Encryption: Encryption beyond the Brute-Force Barrier.
IEEE Security & Privacy, 2014

Honey Encryption: Security Beyond the Brute-Force Bound.
IACR Cryptology ePrint Archive, 2014

Scheduler-based Defenses against Cross-VM Side-channels.
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014

LibFTE: A Toolkit for Constructing Practical, Format-Abiding Encryption Schemes.
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014

Privacy in Pharmacogenetics: An End-to-End Case Study of Personalized Warfarin Dosing.
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014

On the Practical Exploitability of Dual EC in TLS Implementations.
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014

Not-So-Random Numbers in Virtualized Linux and the Whirlwind RNG.
Proceedings of the 2014 IEEE Symposium on Security and Privacy, 2014

WhoWas: A Platform for Measuring Web Deployments on IaaS Clouds.
Proceedings of the 2014 Internet Measurement Conference, 2014

A Day Late and a Dollar Short: The Case for Research on Cloud Billing Systems.
Proceedings of the 6th USENIX Workshop on Hot Topics in Cloud Computing, 2014

Honey Encryption: Security Beyond the Brute-Force Bound.
Proceedings of the Advances in Cryptology - EUROCRYPT 2014, 2014

Cross-Tenant Side-Channel Attacks in PaaS Clouds.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

Formatted Encryption Beyond Regular Languages.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

2013
To Hash or Not to Hash Again? (In)differentiability Results for H2 and HMAC.
IACR Cryptology ePrint Archive, 2013

DupLESS: Server-Aided Encryption for Deduplicated Storage.
IACR Cryptology ePrint Archive, 2013

DupLESS: Server-Aided Encryption for Deduplicated Storage.
Proceedings of the 22th USENIX Security Symposium, Washington, DC, USA, August 14-16, 2013, 2013

FIE on Firmware: Finding Vulnerabilities in Embedded Systems Using Symbolic Execution.
Proceedings of the 22th USENIX Security Symposium, Washington, DC, USA, August 14-16, 2013, 2013

Next stop, the cloud: understanding modern web service deployment in EC2 and azure.
Proceedings of the 2013 Internet Measurement Conference, 2013

Message-Locked Encryption and Secure Deduplication.
Proceedings of the Advances in Cryptology, 2013

The Mix-and-Cut Shuffle: Small-Domain Encryption Secure against N Queries.
Proceedings of the Advances in Cryptology - CRYPTO 2013, 2013

Protocol misidentification made easy with format-transforming encryption.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

2012
Format-Transforming Encryption: More than Meets the DPI.
IACR Cryptology ePrint Archive, 2012

Multi-Instance Security and its Application to Password-Based Cryptography.
IACR Cryptology ePrint Archive, 2012

Message-Locked Encryption and Secure Deduplication.
IACR Cryptology ePrint Archive, 2012

Hedged Public-key Encryption: How to Protect against Bad Randomness.
IACR Cryptology ePrint Archive, 2012

Security Analysis of Smartphone Point-of-Sale Systems.
Proceedings of the 6th USENIX Workshop on Offensive Technologies, 2012

Randomness Condensers for Efficiently Samplable, Seed-Dependent Sources.
Proceedings of the Theory of Cryptography - 9th Theory of Cryptography Conference, 2012

Peek-a-Boo, I Still See You: Why Efficient Traffic Analysis Countermeasures Fail.
Proceedings of the IEEE Symposium on Security and Privacy, 2012

To Hash or Not to Hash Again? (In)Differentiability Results for H 2 and HMAC.
Proceedings of the Advances in Cryptology - CRYPTO 2012, 2012

Multi-instance Security and Its Application to Password-Based Cryptography.
Proceedings of the Advances in Cryptology - CRYPTO 2012, 2012

More for your money: exploiting performance heterogeneity in public clouds.
Proceedings of the ACM Symposium on Cloud Computing, SOCC '12, 2012

Cross-VM side channels and their use to extract private keys.
Proceedings of the ACM Conference on Computer and Communications Security, 2012

Resource-freeing attacks: improve your cloud performance (at your neighbor's expense).
Proceedings of the ACM Conference on Computer and Communications Security, 2012

2011
Careful with Composition: Limitations of Indifferentiability and Universal Composability.
IACR Cryptology ePrint Archive, 2011

Careful with Composition: Limitations of the Indifferentiability Framework.
Proceedings of the Advances in Cryptology - EUROCRYPT 2011, 2011

Tag Size Does Matter: Attacks and Proofs for the TLS Record Protocol.
Proceedings of the Advances in Cryptology - ASIACRYPT 2011, 2011

2010
New approaches for the design and analysis of cryptographic hash functions.
PhD thesis, 2010

When Good Randomness Goes Bad: Virtual Machine Reset Vulnerabilities and Hedging Deployed Cryptography.
Proceedings of the Network and Distributed System Security Symposium, 2010

Random Oracles with(out) Programmability.
Proceedings of the Advances in Cryptology - ASIACRYPT 2010, 2010

2009
Salvaging Merkle-Damgard for Practical Applications.
IACR Cryptology ePrint Archive, 2009

Format-Preserving Encryption.
IACR Cryptology ePrint Archive, 2009

Simulation without the Artificial Abort: Simplified Proof and Improved Concrete Security for Waters' IBE Scheme.
IACR Cryptology ePrint Archive, 2009

Format-Preserving Encryption.
Proceedings of the Selected Areas in Cryptography, 16th Annual International Workshop, 2009

Salvaging Merkle-Damgård for Practical Applications.
Proceedings of the Advances in Cryptology, 2009

Simulation without the Artificial Abort: Simplified Proof and Improved Concrete Security for Waters' IBE Scheme.
Proceedings of the Advances in Cryptology, 2009

Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds.
Proceedings of the 2009 ACM Conference on Computer and Communications Security, 2009

Hedged Public-Key Encryption: How to Protect against Bad Randomness.
Proceedings of the Advances in Cryptology, 2009

2008
How to Build a Hash Function from any Collision-Resistant Function.
IACR Cryptology ePrint Archive, 2008

Deterministic Encryption: Definitional Equivalences and Constructions without Random Oracles.
IACR Cryptology ePrint Archive, 2008

Privacy-Preserving Location Tracking of Lost or Stolen Devices: Cryptographic Techniques and Replacing Trusted Third Parties with DHTs.
Proceedings of the 17th USENIX Security Symposium, 2008

Deterministic Encryption: Definitional Equivalences and Constructions without Random Oracles.
Proceedings of the Advances in Cryptology, 2008

2007
The Power of Proofs-of-Possession: Securing Multiparty Signatures against Rogue-Key Attacks.
IACR Cryptology ePrint Archive, 2007

How to Enrich the Message Space of a Cipher.
IACR Cryptology ePrint Archive, 2007

Hash Functions in the Dedicated-Key Setting: Design Choices and MPP Transforms.
IACR Cryptology ePrint Archive, 2007

Hash Functions in the Dedicated-Key Setting: Design Choices and MPP Transforms.
Proceedings of the Automata, Languages and Programming, 34th International Colloquium, 2007

How to Enrich the Message Space of a Cipher.
Proceedings of the Fast Software Encryption, 14th International Workshop, 2007

The Power of Proofs-of-Possession: Securing Multiparty Signatures against Rogue-Key Attacks.
Proceedings of the Advances in Cryptology, 2007

How to Build a Hash Function from Any Collision-Resistant Function.
Proceedings of the Advances in Cryptology, 2007

2006
Multi-Property-Preserving Hash Domain Extension and the EMD Transform.
IACR Cryptology ePrint Archive, 2006

Multi-Property-Preserving Hash Domain Extension and the EMD Transform.
Proceedings of the Advances in Cryptology, 2006

Back to the Future: A Framework for Automatic Malware Removal and System Repair.
Proceedings of the 22nd Annual Computer Security Applications Conference (ACSAC 2006), 2006


  Loading...