Joseph Bonneau

Orcid: 0000-0002-6349-0145

Affiliations:
  • New York University, NY, USA
  • Stanford University, CA, USA (former)


According to our database1, Joseph Bonneau authored at least 88 papers between 2006 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
NOTRY: Deniable messaging with retroactive avowal.
Proc. Priv. Enhancing Technol., 2024

Atomic and Fair Data Exchange via Blockchain.
IACR Cryptol. ePrint Arch., 2024

How Much Public Randomness Do Modern Consensus Protocols Need?
IACR Cryptol. ePrint Arch., 2024

Good things come to those who wait: Dishonest-Majority Coin-Flipping Requires Delay Functions.
IACR Cryptol. ePrint Arch., 2024

Accountable Secret Leader Election.
Proceedings of the 6th Conference on Advances in Financial Technologies, 2024

Cornucopia: Distributed Randomness at Scale.
Proceedings of the 6th Conference on Advances in Financial Technologies, 2024

2023
Transparency, Trust, and Security Needs for the Design of Digital News Authentication Tools.
Proc. ACM Hum. Comput. Interact., April, 2023

Zombie: Middleboxes that Don't Snoop.
IACR Cryptol. ePrint Arch., 2023

Riggs: Decentralized Sealed-Bid Auctions.
IACR Cryptol. ePrint Arch., 2023

Naysayer proofs.
IACR Cryptol. ePrint Arch., 2023

Cicada: A framework for private non-interactive on-chain auctions and voting.
IACR Cryptol. ePrint Arch., 2023

Cornucopia: Distributed randomness beacons at scale.
IACR Cryptol. ePrint Arch., 2023

SoK: Distributed Randomness Beacons.
IACR Cryptol. ePrint Arch., 2023

Bicorn: An optimistically efficient distributed randomness beacon.
IACR Cryptol. ePrint Arch., 2023

High Performance, Low Energy, and Trustworthy Blockchains Using Satellites.
Found. Trends Netw., 2023

Limits on Revocable Proof Systems, With Implications for Stateless Blockchains.
Proceedings of the Financial Cryptography and Data Security, 2023

2022
Powers-of-Tau to the People: Decentralizing Setup Ceremonies.
IACR Cryptol. ePrint Arch., 2022

Limits on revocable proof systems, with applications to stateless blockchains.
IACR Cryptol. ePrint Arch., 2022

Short-lived zero-knowledge proofs and signatures.
IACR Cryptol. ePrint Arch., 2022

Usable Cryptographic Provenance: A Proactive Complement to Fact-Checking for Mitigating Misinformation.
Proceedings of the Workshop Proceedings of the 16th International AAAI Conference on Web and Social Media, 2022

VeRSA: Verifiable Registries with Efficient Client Audits from RSA Authenticated Dictionaries.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

2021
Client-Auditable Verifiable Registries.
IACR Cryptol. ePrint Arch., 2021

Zero-Knowledge Middleboxes.
IACR Cryptol. ePrint Arch., 2021

2020
Proof of Necessary Work: Succinct State Verification with Fairness Guarantees.
IACR Cryptol. ePrint Arch., 2020

Coda: Decentralized Cryptocurrency at Scale.
IACR Cryptol. ePrint Arch., 2020

2019
"I was told to buy a software or lose my computer. I ignored it": A study of ransomware.
Proceedings of the Fifteenth Symposium on Usable Privacy and Security, 2019

2018
Verifiable Delay Functions.
IACR Cryptol. ePrint Arch., 2018

Blockchain Security at Scale (Dagstuhl Seminar 18461).
Dagstuhl Reports, 2018

Hostile Blockchain Takeovers (Short Paper).
Proceedings of the Financial Cryptography and Data Security, 2018

2017
Certificate Transparency with Privacy.
Proc. Priv. Enhancing Technol., 2017

Obstacles to the Adoption of Secure Communication Tools.
Proceedings of the 2017 IEEE Symposium on Security and Privacy, 2017

Escrow Protocols for Cryptocurrencies: How to Buy Physical Goods Using Bitcoin.
Proceedings of the Financial Cryptography and Data Security, 2017

Can Unicorns Help Users Compare Crypto Key Fingerprints?
Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems, 2017

2016
Differentially Private Password Frequency Lists.
IACR Cryptol. ePrint Arch., 2016

The Bitcoin Brain Drain: Examining the Use and Abuse of Bitcoin Brain Wallets.
Proceedings of the Financial Cryptography and Data Security, 2016

Incentive Compatibility of Bitcoin Mining Pool Reward Functions.
Proceedings of the Financial Cryptography and Data Security, 2016

EthIKS: Using Ethereum to Audit a CONIKS Key Transparency Log.
Proceedings of the Financial Cryptography and Data Security, 2016

Why Buy When You Can Rent? - Bribery Attacks on Bitcoin-Style Consensus.
Proceedings of the Financial Cryptography and Data Security, 2016

Bitcoin and Cryptocurrency Technologies - A Comprehensive Introduction.
Princeton University Press, ISBN: 978-0-691-17169-2, 2016

2015
Provisions: Privacy-preserving proofs of solvency for Bitcoin exchanges.
IACR Cryptol. ePrint Arch., 2015

Cracking-Resistant Password Vaults using Natural Language Encoders.
IACR Cryptol. ePrint Arch., 2015

Research Perspectives and Challenges for Bitcoin and Cryptocurrencies.
IACR Cryptol. ePrint Arch., 2015

On Bitcoin as a public randomness source.
IACR Cryptol. ePrint Arch., 2015

Passwords and the evolution of imperfect authentication.
Commun. ACM, 2015

Secrets, Lies, and Account Recovery: Lessons from the Use of Personal Knowledge Questions at Google.
Proceedings of the 24th International Conference on World Wide Web, 2015

An Empirical Study of Namecoin and Lessons for Decentralized Namespace Design.
Proceedings of the 14th Annual Workshop on the Economics of Information Security, 2015

CONIKS: Bringing Key Transparency to End Users.
Proceedings of the 24th USENIX Security Symposium, 2015

SoK: Secure Messaging.
Proceedings of the 2015 IEEE Symposium on Security and Privacy, 2015

SoK: Research Perspectives and Challenges for Bitcoin and Cryptocurrencies.
Proceedings of the 2015 IEEE Symposium on Security and Privacy, 2015

Learning Assigned Secrets for Unlocking Mobile Devices.
Proceedings of the Eleventh Symposium On Usable Privacy and Security, 2015

Upgrading HTTPS in mid-air: An empirical study of strict transport security and key pinning.
Proceedings of the 22nd Annual Network and Distributed System Security Symposium, 2015

POSTER: Secure Chat for the Masses? User-centered Security to the Rescue.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

2014
CONIKS: A Privacy-Preserving Consistent Key Service for Secure End-to-End Communication.
IACR Cryptol. ePrint Arch., 2014

Mixcoin: Anonymity for Bitcoin with accountable mixes.
IACR Cryptol. ePrint Arch., 2014

Towards Reliable Storage of 56-bit Secrets in Human Memory.
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014

Fawkescoin - A Cryptocurrency Without Public-Key Cryptography.
Proceedings of the Security Protocols XXII, 2014

FawkesCoin: A Cryptocurrency Without Public-Key Cryptography (Transcript of Discussion).
Proceedings of the Security Protocols XXII, 2014

The Tangled Web of Password Reuse.
Proceedings of the 21st Annual Network and Distributed System Security Symposium, 2014

Cognitive disconnect: understanding facebook connect login permissions.
Proceedings of the second ACM conference on Online social networks, 2014

2012
Guessing human-chosen secrets.
PhD thesis, 2012

Statistical Metrics for Individual Password Strength (Transcript of Discussion).
Proceedings of the Security Protocols XX, 2012

Statistical Metrics for Individual Password Strength.
Proceedings of the Security Protocols XX, 2012

The Quest to Replace Passwords: A Framework for Comparative Evaluation of Web Authentication Schemes.
Proceedings of the IEEE Symposium on Security and Privacy, 2012

The Science of Guessing: Analyzing an Anonymized Corpus of 70 Million Passwords.
Proceedings of the IEEE Symposium on Security and Privacy, 2012

It's Not Stealing If You Need It: A Panel on the Ethics of Performing Research Using Public Data of Illicit Origin.
Proceedings of the Financial Cryptography and Data Security, 2012

Linguistic Properties of Multi-word Passphrases.
Proceedings of the Financial Cryptography and Data Security, 2012

A Birthday Present Every Eleven Wallets? The Security of Customer-Chosen Banking PINs.
Proceedings of the Financial Cryptography and Data Security, 2012

2011
The Privacy Landscape: Product Differentiation on Data Collection.
Proceedings of the 10th Annual Workshop on the Economics of Information Security, 2011

Scrambling for Lightweight Censorship Resistance.
Proceedings of the Security Protocols XIX, 2011

Getting Web Authentication Right (Transcript of Discussion).
Proceedings of the Security Protocols XIX, 2011

Getting Web Authentication Right A Best-Case Protocol for the Remaining Life of Passwords.
Proceedings of the Security Protocols XIX, 2011

2010
Don't Tread on Me: Moderating Access to OSN Data with SpikeStrip.
Proceedings of the 3rd Workshop on Online Social Networks, 2010

The Password Thicket: Technical and Market Failures in Human Authentication on the Web.
Proceedings of the 9th Annual Workshop on the Economics of Information Security, 2010

Inglorious Installers: Security in the Application Marketplace.
Proceedings of the 9th Annual Workshop on the Economics of Information Security, 2010

Digital Immolation (Transcript of Discussion).
Proceedings of the Security Protocols XVIII, 2010

Digital Immolation - New Directions for Online Protest.
Proceedings of the Security Protocols XVIII, 2010

The Password Game: Negative Externalities from Weak Password Practices.
Proceedings of the Decision and Game Theory for Security, 2010

What's in a Name?
Proceedings of the Financial Cryptography and Data Security, 14th International Conference, 2010

2009
The Privacy Jungle: On the Market for Data Protection in Social Networks.
Proceedings of the 8th Annual Workshop on the Economics of Information Security, 2009

Alice and Bob in Love.
Proceedings of the Security Protocols XVII, 2009

Privacy stories: confidence in privacy behaviors through end user programming.
Proceedings of the 5th Symposium on Usable Privacy and Security, 2009

Privacy suites: shared privacy for social networks.
Proceedings of the 5th Symposium on Usable Privacy and Security, 2009

Eight friends are enough: social graph approximation via public listings.
Proceedings of the Second ACM EuroSys Workshop on Social Network Systems, 2009

Privacy-enabling social networking over untrusted networks.
Proceedings of the 2nd ACM Workshop on Online Social Networks, 2009

Privacy-enhanced public view for social graphs.
Proceedings of the 2nd ACM Workshop on Social Web Search and Mining, 2009

Prying Data out of a Social Network.
Proceedings of the 2009 International Conference on Advances in Social Network Analysis and Mining, 2009

2006
Robust Final-Round Cache-Trace Attacks Against AES.
IACR Cryptol. ePrint Arch., 2006

Cache-Collision Timing Attacks Against AES.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2006


  Loading...