Thomas Ristenpart
Orcid: 0000-0002-8642-9558Affiliations:
- Cornell Tech, New York, NY, USA
- University of Wisconsin-Madison, USA
According to our database1,
Thomas Ristenpart
authored at least 125 papers
between 2006 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2025
2024
Data Stewardship in Clinical Computer Security: Balancing Benefit and Burden in Participatory Systems.
Proc. ACM Hum. Comput. Interact., 2024
Is ML-Based Cryptanalysis Inherently Limited? Simulating Cryptographic Adversaries via Gradient-Based Methods.
IACR Cryptol. ePrint Arch., 2024
Mitigating Trauma in Qualitative Research Infrastructure: Roles for Machine Assistance and Trauma-Informed Design.
CoRR, 2024
Proceedings of the 33rd USENIX Security Symposium, 2024
Proceedings of the 33rd USENIX Security Symposium, 2024
Proceedings of the IEEE Symposium on Security and Privacy, 2024
Proceedings of the IEEE Symposium on Security and Privacy, 2024
Proceedings of the IEEE Symposium on Security and Privacy, 2024
2023
IACR Cryptol. ePrint Arch., 2023
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the 32nd USENIX Security Symposium, 2023
The Digital-Safety Risks of Financial Technologies for Survivors of Intimate Partner Violence.
Proceedings of the 32nd USENIX Security Symposium, 2023
2022
Proc. ACM Hum. Comput. Interact., 2022
Proceedings of the 31st USENIX Security Symposium, 2022
Proceedings of the 31st USENIX Security Symposium, 2022
Proceedings of the 31st USENIX Security Symposium, 2022
Proceedings of the CHI '22: CHI Conference on Human Factors in Computing Systems, New Orleans, LA, USA, 29 April 2022, 2022
Proceedings of the CHI '22: CHI Conference on Human Factors in Computing Systems, New Orleans, LA, USA, 29 April 2022, 2022
2021
IACR Cryptol. ePrint Arch., 2021
The Role of Computer Security Customer Support in Helping Survivors of Intimate Partner Violence.
Proceedings of the 30th USENIX Security Symposium, 2021
Proceedings of the 30th USENIX Security Symposium, 2021
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021
A Digital Safety Dilemma: Analysis of Computer-Mediated Computer Security Interventions for Intimate Partner Violence During COVID-19.
Proceedings of the CHI '21: CHI Conference on Human Factors in Computing Systems, 2021
2020
"So-called privacy breeds evil": Narrative Justifications for Intimate Partner Surveillance in Online Forums.
Proc. ACM Hum. Comput. Interact., 2020
IACR Cryptol. ePrint Arch., 2020
The Tools and Tactics Used in Intimate Partner Surveillance: An Analysis of Online Infidelity Forums.
Proceedings of the 29th USENIX Security Symposium, 2020
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020
Towards Measuring Adversarial Twitter Interactions against Candidates in the US Midterm Elections.
Proceedings of the Fourteenth International AAAI Conference on Web and Social Media, 2020
Characterizing Twitter Users Who Engage in Adversarial Interactions against Political Candidates.
Proceedings of the CHI '20: CHI Conference on Human Factors in Computing Systems, 2020
2019
"Is my phone hacked?" Analyzing Clinical Computer Security Interventions with Survivors of Intimate Partner Violence.
Proc. ACM Hum. Comput. Interact., 2019
Asymmetric Message Franking: Content Moderation for Metadata-Private End-to-End Encryption.
IACR Cryptol. ePrint Arch., 2019
IACR Cryptol. ePrint Arch., 2019
Proceedings of the 28th USENIX Security Symposium, 2019
Proceedings of the 2019 IEEE Symposium on Security and Privacy, 2019
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019
2018
IACR Cryptol. ePrint Arch., 2018
CoRR, 2018
Proceedings of the 2018 USENIX Annual Technical Conference, 2018
Proceedings of the 2018 IEEE Symposium on Security and Privacy, 2018
Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, 2018
2017
Digital Technologies and Intimate Partner Violence: A Qualitative Analysis with Multiple Stakeholders.
Proc. ACM Hum. Comput. Interact., 2017
A New Distribution Sensitive Secure Sketch and a Comparison Between Approaches to Typo-Tolerant Authentication.
IACR Cryptol. ePrint Arch., 2017
IACR Cryptol. ePrint Arch., 2017
IACR Cryptol. ePrint Arch., 2017
Proceedings of the 2017 IEEE Symposium on Security and Privacy, 2017
Proceedings of the Advances in Cryptology - CRYPTO 2017, 2017
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017
2016
IEEE Secur. Priv., 2016
IACR Cryptol. ePrint Arch., 2016
IACR Cryptol. ePrint Arch., 2016
IACR Cryptol. ePrint Arch., 2016
IACR Cryptol. ePrint Arch., 2016
IACR Cryptol. ePrint Arch., 2016
Proceedings of the 10th USENIX Workshop on Offensive Technologies, 2016
Proceedings of the 25th USENIX Security Symposium, 2016
Proceedings of the IEEE Symposium on Security and Privacy, 2016
Proceedings of the Seventh ACM Symposium on Cloud Computing, 2016
2015
IACR Cryptol. ePrint Arch., 2015
Proceedings of the 24th USENIX Security Symposium, 2015
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
Model Inversion Attacks that Exploit Confidence Information and Basic Countermeasures.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
2014
IACR Cryptol. ePrint Arch., 2014
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014
Privacy in Pharmacogenetics: An End-to-End Case Study of Personalized Warfarin Dosing.
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014
Proceedings of the 2014 IEEE Symposium on Security and Privacy, 2014
Proceedings of the 2014 Internet Measurement Conference, 2014
Proceedings of the 6th USENIX Workshop on Hot Topics in Cloud Computing, 2014
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014
2013
To Hash or Not to Hash Again? (In)differentiability Results for H<sup>2</sup> and HMAC.
IACR Cryptol. ePrint Arch., 2013
IACR Cryptol. ePrint Arch., 2013
FIE on Firmware: Finding Vulnerabilities in Embedded Systems Using Symbolic Execution.
Proceedings of the 22th USENIX Security Symposium, Washington, DC, USA, August 14-16, 2013, 2013
Proceedings of the 2013 Internet Measurement Conference, 2013
Proceedings of the Advances in Cryptology - CRYPTO 2013, 2013
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013
2012
IACR Cryptol. ePrint Arch., 2012
IACR Cryptol. ePrint Arch., 2012
IACR Cryptol. ePrint Arch., 2012
Proceedings of the 6th USENIX Workshop on Offensive Technologies, 2012
Proceedings of the Theory of Cryptography - 9th Theory of Cryptography Conference, 2012
Proceedings of the IEEE Symposium on Security and Privacy, 2012
Proceedings of the Advances in Cryptology - CRYPTO 2012, 2012
Proceedings of the ACM Symposium on Cloud Computing, SOCC '12, 2012
Proceedings of the ACM Conference on Computer and Communications Security, 2012
Resource-freeing attacks: improve your cloud performance (at your neighbor's expense).
Proceedings of the ACM Conference on Computer and Communications Security, 2012
2011
Careful with Composition: Limitations of Indifferentiability and Universal Composability.
IACR Cryptol. ePrint Arch., 2011
Proceedings of the 2011 Joint WICOW/AIRWeb Workshop on Web Quality, 2011
Proceedings of the Advances in Cryptology - EUROCRYPT 2011, 2011
Proceedings of the Advances in Cryptology - ASIACRYPT 2011, 2011
2010
PhD thesis, 2010
When Good Randomness Goes Bad: Virtual Machine Reset Vulnerabilities and Hedging Deployed Cryptography.
Proceedings of the Network and Distributed System Security Symposium, 2010
Proceedings of the Advances in Cryptology - ASIACRYPT 2010, 2010
2009
IACR Cryptol. ePrint Arch., 2009
Simulation without the Artificial Abort: Simplified Proof and Improved Concrete Security for Waters' IBE Scheme.
IACR Cryptol. ePrint Arch., 2009
Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds.
Proceedings of the 2009 ACM Conference on Computer and Communications Security, 2009
2008
IACR Cryptol. ePrint Arch., 2008
Deterministic Encryption: Definitional Equivalences and Constructions without Random Oracles.
IACR Cryptol. ePrint Arch., 2008
Privacy-Preserving Location Tracking of Lost or Stolen Devices: Cryptographic Techniques and Replacing Trusted Third Parties with DHTs.
Proceedings of the 17th USENIX Security Symposium, 2008
2007
The Power of Proofs-of-Possession: Securing Multiparty Signatures against Rogue-Key Attacks.
IACR Cryptol. ePrint Arch., 2007
IACR Cryptol. ePrint Arch., 2007
2006
IACR Cryptol. ePrint Arch., 2006
Proceedings of the 22nd Annual Computer Security Applications Conference (ACSAC 2006), 2006