Jeremiah Blocki
Orcid: 0000-0002-5542-4674Affiliations:
- Purdue University, Department of Computer Science, West Lafayette, IN, USA
- Microsoft Research, Cambridge, MA, USA (former)
- Carnegie Mellon University, Pittsburgh, PA, USA (former, PhD 2014)
According to our database1,
Jeremiah Blocki
authored at least 76 papers
between 2010 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on zbmath.org
-
on linkedin.com
-
on cs.cmu.edu
-
on twitter.com
-
on orcid.org
On csauthors.net:
Bibliography
2024
Conditional Encryption with Applications to Secure Personalized Password Typo Correction.
CoRR, 2024
2023
CoRR, 2023
Confident Monte Carlo: Rigorous Analysis of Guessing Curves for Probabilistic Password Models.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023
Proceedings of the IEEE International Symposium on Information Theory, 2023
Proceedings of the Eleventh International Conference on Learning Representations, 2023
Proceedings of the 38th Computational Complexity Conference, 2023
How to Make Your Approximation Algorithm Private: A Black-Box Differentially-Private Transformation for Tunable Approximation Algorithms of Functions with Low Sensitivity.
Proceedings of the Approximation, 2023
2022
IACR Cryptol. ePrint Arch., 2022
Sustained Space and Cumulative Complexity Trade-offs for Data-Dependent Memory-Hard Functions.
IACR Cryptol. ePrint Arch., 2022
Using Illustrations to Communicate Differential Privacy Trust Models: An Investigation of Users' Comprehension, Perception, and Data Sharing Decision.
CoRR, 2022
Proceedings of the 39th International Symposium on Theoretical Aspects of Computer Science, 2022
Proceedings of the 49th International Colloquium on Automata, Languages, and Programming, 2022
Proceedings of the Advances in Cryptology - EUROCRYPT 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30, 2022
2021
IEEE Trans. Inf. Theory, 2021
Memory-Hard Puzzles in the Standard Model with Applications to Memory-Hard Functions and Resource-Bounded Locally Decodable Codes.
IACR Cryptol. ePrint Arch., 2021
Bicycle attacks considered harmful: Quantifying the damage of widespread password length leakage.
Comput. Secur., 2021
Proceedings of the IEEE International Symposium on Information Theory, 2021
Proceedings of the IEEE International Symposium on Information Theory, 2021
Proceedings of the 12th Innovations in Theoretical Computer Science Conference, 2021
Proceedings of the GPCE '21: Concepts and Experiences, Chicago, IL, USA, October 17, 2021
Proceedings of the Decision and Game Theory for Security - 12th International Conference, 2021
Exponential Lower Bounds for Locally Decodable and Correctable Codes for Insertions and Deletions.
Proceedings of the 62nd IEEE Annual Symposium on Foundations of Computer Science, 2021
Proceedings of the Financial Cryptography and Data Security, 2021
Proceedings of the 2nd Conference on Information-Theoretic Cryptography, 2021
2020
CoRR, 2020
Proceedings of the 11th Innovations in Theoretical Computer Science Conference, 2020
Proceedings of the 11th Innovations in Theoretical Computer Science Conference, 2020
Proceedings of the 1st Conference on Information-Theoretic Cryptography, 2020
Proceedings of the 40th IARCS Annual Conference on Foundations of Software Technology and Theoretical Computer Science, 2020
2019
IACR Cryptol. ePrint Arch., 2019
2018
IACR Cryptol. ePrint Arch., 2018
IACR Cryptol. ePrint Arch., 2018
Proceedings of the 2018 IEEE Symposium on Security and Privacy, 2018
Brief Announcement: Relaxed Locally Correctable Codes in Computationally Bounded Channels.
Proceedings of the 45th International Colloquium on Automata, Languages, and Programming, 2018
Proceedings of the Financial Cryptography and Data Security, 2018
2017
IACR Cryptol. ePrint Arch., 2017
IACR Cryptol. ePrint Arch., 2017
Proceedings of the 26th USENIX Security Symposium, 2017
Proceedings of the 8th Innovations in Theoretical Computer Science Conference, 2017
2016
IACR Cryptol. ePrint Arch., 2016
IACR Cryptol. ePrint Arch., 2016
IACR Cryptol. ePrint Arch., 2016
IACR Cryptol. ePrint Arch., 2016
Proceedings of the IEEE 29th Computer Security Foundations Symposium, 2016
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016
2015
Proceedings of the 22nd Annual Network and Distributed System Security Symposium, 2015
Proceedings of the Twenty-Ninth AAAI Conference on Artificial Intelligence, 2015
2014
2013
Proceedings of the fourteenth ACM Conference on Electronic Commerce, 2013
Proceedings of the Innovations in Theoretical Computer Science, 2013
Proceedings of the Decision and Game Theory for Security - 4th International Conference, 2013
2012
Proceedings of the Decision and Game Theory for Security - Third International Conference, 2012
Proceedings of the 53rd Annual IEEE Symposium on Foundations of Computer Science, 2012
2011
Take Two Software Updates and See Me in the Morning: The Case for Software Security Evaluations of Medical Devices.
Proceedings of the 2nd USENIX Workshop on Health Security and Privacy, 2011
Proceedings of the 2nd USENIX Workshop on Health Security and Privacy, 2011
Understanding and Protecting Privacy: Formal Semantics and Principled Audit Mechanisms.
Proceedings of the Information Systems Security - 7th International Conference, 2011
Proceedings of the 24th IEEE Computer Security Foundations Symposium, 2011
2010
Proceedings of the Automata, Languages and Programming, 37th International Colloquium, 2010