Follow
Thomas Ristenpart
Thomas Ristenpart
Professor of Computer Science, Cornell Tech
Verified email at cornell.edu - Homepage
Title
Cited by
Year
Private Hierarchical Governance for Encrypted Messaging
A Namavari, B Wang, S Menda, B Nassi, N Tyagi, J Grimmelmann, ...
2024 IEEE Symposium on Security and Privacy (SP), 255-255, 2024
2024
Data Stewardship in Clinical Computer Security: Balancing Benefit and Burden in Participatory Systems
E Tseng, R Bellini, YY Lee, A Ramjit, T Ristenpart, N Dell
Proceedings of the ACM on Human-Computer Interaction 8 (CSCW1), 1-29, 2024
12024
Injection Attacks Against End-to-End Encrypted Applications
A Fábrega, CO Pérez, A Namavari, B Nassi, R Agarwal, T Ristenpart
2024 IEEE Symposium on Security and Privacy (SP), 82-82, 2023
2023
SoK: Safer Digital-Safety Research Involving At-Risk Users
R Bellini, E Tseng, N Warford, A Daffalla, T Matthews, S Consolvo, ...
arXiv preprint arXiv:2309.00735, 2023
72023
Flexible Authenticated Encryption
S Menda, J Len, VT Hoang, M Bellare, T Ristenpart
2023
Context Discovery and Commitment Attacks: How to Break CCM, EAX, SIV, and More
S Menda, J Len, P Grubbs, T Ristenpart
Annual International Conference on the Theory and Applications of …, 2023
82023
Account security interfaces: important, unintuitive, and untrustworthy
A Daffalla, M Bohuk, N Dell, R Bellini, T Ristenpart
32nd USENIX Security Symposium (USENIX Security 23), 3601-3618, 2023
12023
The {Digital-Safety} Risks of Financial Technologies for Survivors of Intimate Partner Violence
R Bellini, K Lee, MA Brown, J Shaffer, R Bhalerao, T Ristenpart
32nd USENIX Security Symposium (USENIX Security 23), 87-104, 2023
22023
{Araña}: Discovering and Characterizing Password Guessing Attacks in Practice
M Islam, MS Bohuk, P Chung, T Ristenpart, R Chatterjee
32nd USENIX Security Symposium (USENIX Security 23), 1019-1036, 2023
22023
Authenticated encryption with key identification
J Len, P Grubbs, T Ristenpart
International Conference on the Theory and Application of Cryptology and …, 2022
32022
Characterizing alternative monetization strategies on YouTube
Y Hua, M Horta Ribeiro, T Ristenpart, R West, M Naaman
Proceedings of the ACM on Human-Computer Interaction 6 (CSCW2), 1-30, 2022
202022
A fast and simple partially oblivious PRF, with applications
N Tyagi, S Celi, T Ristenpart, N Sullivan, S Tessaro, CA Wood
Annual International Conference on the Theory and Applications of …, 2022
172022
Trauma-informed computing: Towards safer technology experiences for all
JX Chen, A McDonald, Y Zou, E Tseng, KA Roundy, A Tamersoy, ...
Proceedings of the 2022 CHI conference on human factors in computing systems …, 2022
742022
Care infrastructures for digital security in intimate partner violence
E Tseng, M Sabet, R Bellini, HK Sodhi, T Ristenpart, N Dell
Proceedings of the 2022 CHI Conference on Human Factors in Computing Systems …, 2022
442022
Gossamer: Securely measuring password-based logins
MS Bohuk, M Islam, S Ahmad, M Swift, T Ristenpart, R Chatterjee
31st USENIX Security Symposium (USENIX Security 22), 1867-1884, 2022
122022
Might I get pwned: A second generation compromised credential checking service
B Pal, M Islam, MS Bohuk, N Sullivan, L Valenta, T Whalen, C Wood, ...
31st USENIX Security Symposium (USENIX Security 22), 1831-1848, 2022
172022
Orca: Blocklisting in {Sender-Anonymous} Messaging
N Tyagi, J Len, I Miers, T Ristenpart
31st USENIX Security Symposium (USENIX Security 22), 2299-2316, 2022
62022
Might I Get Pwned: A second generation password breach alerting service
B Pal, M Islam, T Ristenpart, R Chatterjee
USENIX Security, 2022
32022
Increasing adversarial uncertainty to scale private similarity testing
Y Hua, A Namavari, K Cheng, M Naaman, T Ristenpart
31st USENIX Security Symposium (USENIX Security 22), 1777-1794, 2022
82022
Sok: Hate, harassment, and the changing landscape of online abuse
K Thomas, D Akhawe, M Bailey, D Boneh, E Bursztein, S Consolvo, ...
2021 IEEE Symposium on Security and Privacy (SP), 247-267, 2021
1382021
The system can't perform the operation now. Try again later.
Articles 1–20