Thomas Ristenpart [Speaker-Timeline] [Speaker-Links]

Tell us about missing data
Title Conference Tags
Pancake: Frequency Smoothing for Encrypted Data Stores 29thUSENIXSecuritySymposium-2020 - Berkeley, USA
Beyond Credential Stuffing: Password Similarity Models using Neural Networks IEEESymposium-2019 - San Francisco, US
Blind Certificate Authorities IEEESymposium-2019 - San Francisco, US
Fast Message Franking: From Invisible Salamanders to Encryptment Crypto2018-2018 - Santa Barbara, USA
Peeking Behind the Curtains of Serverless Platforms UsenixATCBoston-2018 - Boston, USA
Message Franking via Committing Authenticated Encryption crypto-2017 - santa barbara,usa
Key Rotation for Authenticated Encryption crypto-2017 - santa barbara,usa
Modifying an Enciphering Scheme after Deployment EuroCrypt-2017 - paris,france
Breaking Web Applications Built On Top of Encrypted Data RWC-2017 - new york city,usa
Stealing Machine Learning Models via Prediction APIs USENIX-2016 - austin,usa
Controlling UAVs with Sensor Input Spoofing Attacks WOOT-2016 - austin,usa
The Pythia PRF Service SecuritySymposium-2015 - washington,USA
A Placement Vulnerability Study in Multi-Tenant Public Clouds SecuritySymposium-2015 - washington,USA
Privacy in Pharmacogenetics: An End-to-End Case Study of Personalized Warfarin Dosing ATC-2015 - Santa Clara,USA
A Formal Treatment of Backdoored Pseudorandom Generators EuroCrypt-2015 - Soia,Bulgaria
Cross-Tenant Side-Channel Attacks in PaaS Clouds CCS-2014 - Scottsdale,USA
Formatted Encryption Beyond Regular Languages CCS-2014 - Scottsdale,USA
Privacy in Pharmacogenetics: An End-to-End Case Study of Personalized Warfarin Dosing usenix-2014 - san diego,usa
On the Practical Exploitability of Dual EC in TLS Implementations usenix-2014 - san diego,usa
Scheduler-based Defenses against Cross-VM Side-channels usenix-2014 - san diego,usa
LibFTE: A Toolkit for Constructing Practical, Format-Abiding Encryption Schemes usenix-2014 - san diego,usa
Not-So-Random Numbers in Virtualized Linux and the Whirlwind RNG IEEE-2014 - SamJose,USA
Honey Encryption: Security Beyond the Brute-Force Bound EuroCrypt-2014 - copenhagen,denmark
DupLESS: Server-Aided Encryption for Deduplicated Storage USENIX-2013 - Washington, D.C.
FIE on Firmware: Finding Vulnerabilities in Embedded Systems Using Symbolic Execution USENIX-2013 - Washington, D.C.
Cloud computing Confrence-on-computer-communications-security-2011 - Chicago, USA Security
Privacy-Preserving Location Tracking Of Lost Or Stolen Devices: Cryptographic Techniques And Replacing Trusted Third Parties With Dhts 17th USENIX Security Symposium-2008 - San Jose, USA Security