Sarah Meiklejohn
Orcid: 0000-0001-5671-1395
According to our database1,
Sarah Meiklejohn
authored at least 67 papers
between 2010 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
On csauthors.net:
Bibliography
2024
Supporting Human Raters with the Detection of Harmful Content using Large Language Models.
CoRR, 2024
Understanding Help-Seeking and Help-Giving on Social Media for Image-Based Sexual Abuse.
Proceedings of the 33rd USENIX Security Symposium, 2024
Proceedings of the 2024 ACM on Internet Measurement Conference, 2024
2023
Distributed Comput., September, 2023
CoRR, 2023
Proceedings of the Financial Cryptography and Data Security, 2023
Bingo: Adaptivity and Asynchrony in Verifiable Secret Sharing and Distributed Key Generation.
Proceedings of the Advances in Cryptology - CRYPTO 2023, 2023
2022
One Server for the Price of Two: Simple and Fast Single-Server Private Information Retrieval.
IACR Cryptol. ePrint Arch., 2022
Bingo: Adaptively Secure Packed Asynchronous Verifiable Secret Sharing and Asynchronous Distributed Key Generation.
IACR Cryptol. ePrint Arch., 2022
Proceedings of the 31st USENIX Security Symposium, 2022
2021
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021
Proceedings of the Financial Cryptography and Data Security, 2021
Proceedings of the Financial Cryptography and Data Security. FC 2021 International Workshops, 2021
Proceedings of the DIS '21: Designing Interactive Systems Conference 2021, 2021
2020
Proc. Priv. Enhancing Technol., 2020
SoK: Algorithmic Incentive Manipulation Attacks on Permissionless PoW Cryptocurrencies.
IACR Cryptol. ePrint Arch., 2020
CoRR, 2020
2019
Sonic: Zero-Knowledge SNARKs from Linear-Size Universal and Updateable Structured Reference Strings.
IACR Cryptol. ePrint Arch., 2019
IACR Cryptol. ePrint Arch., 2019
Proceedings of the 28th USENIX Security Symposium, 2019
Coconut: Threshold Issuance Selective Disclosure Credentials with Applications to Distributed Ledgers.
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019
Proceedings of the Financial Cryptography and Data Security, 2019
Sonic: Zero-Knowledge SNARKs from Linear-Size Universal and Updatable Structured Reference Strings.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019
Proceedings of the 1st ACM Conference on Advances in Financial Technologies, 2019
2018
Proc. Priv. Enhancing Technol., 2018
IEEE Secur. Priv., 2018
IACR Cryptol. ePrint Arch., 2018
IACR Cryptol. ePrint Arch., 2018
Why is a Ravencoin Like a TokenDesk? An Exploration of Code Diversity in the Cryptocurrency Landscape.
CoRR, 2018
CoRR, 2018
Proceedings of the 27th USENIX Security Symposium, 2018
Egalitarian Society or Benevolent Dictatorship: The State of Cryptocurrency Governance.
Proceedings of the Financial Cryptography and Data Security, 2018
Proceedings of the Data Privacy Management, Cryptocurrencies and Blockchain Technology, 2018
2017
Proceedings of the Data Privacy Management, Cryptocurrencies and Blockchain Technology, 2017
2016
IACR Cryptol. ePrint Arch., 2016
Commun. ACM, 2016
2015
Proceedings of the Financial Cryptography and Data Security, 2015
2014
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2014
IACR Cryptol. ePrint Arch., 2014
Proceedings of the 21st Annual Network and Distributed System Security Symposium, 2014
Rethinking Verifiably Encrypted Signatures: A Gap in Functionality and Potential Solutions.
Proceedings of the Topics in Cryptology - CT-RSA 2014, 2014
Proceedings of the IEEE 27th Computer Security Foundations Symposium, 2014
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014
2013
IACR Cryptol. ePrint Arch., 2013
A Profitable Sub-Prime Loan: Obtaining the Advantages of Composite-Order in Prime-Order Bilinear Groups.
IACR Cryptol. ePrint Arch., 2013
Malleable Signatures: Complex Unary Transformations and Delegatable Anonymous Credentials.
IACR Cryptol. ePrint Arch., 2013
IACR Cryptol. ePrint Arch., 2013
Proceedings of the Design, Automation and Test in Europe, 2013
2012
ZKPDL: A Language-Based System for Efficient Zero-Knowledge Proofs and Electronic Cash.
IACR Cryptol. ePrint Arch., 2012
IACR Cryptol. ePrint Arch., 2012
2011
Proceedings of the 5th USENIX Workshop on Offensive Technologies, 2011
The Phantom Tollbooth: Privacy-Preserving Electronic Toll Collection in the Presence of Driver Collusion.
Proceedings of the 20th USENIX Security Symposium, 2011
2010
Review of an introduction to mathematical cryptography by Jeffrey Hoffstein, Jill Pipher, and Joseph Silverman Springer-Verlag, 2008.
SIGACT News, 2010
Limitations on Transformations from Composite-Order to Prime-Order Groups: The Case of Round-Optimal Blind Signatures.
IACR Cryptol. ePrint Arch., 2010