What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Jeremiah Blocki
Google Scholar
ORCID:
0000-0002-5542-4674
33
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/eurocrypt
The Impact of Reversibility on Parallel Pebbling.
Jeremiah Blocki
Blake Holman
Seunghoon Lee
2025
journals/cic
A Tight Lower Bound on the TdScrypt Trapdoor Memory-Hard Function.
Jeremiah Blocki
Seunghoon Lee
2024
journals/joc
Bandwidth-Hard Functions: Reductions and Lower Bounds.
Jeremiah Blocki
Peiyuan Liu
Ling Ren
Samson Zhou
2024
conf/ccs
Conditional Encryption with Applications to Secure Personalized Password Typo Correction.
Mohammad Hassan Ameri
Jeremiah Blocki
2023
conf/sp
Towards a Rigorous Statistical Analysis of Empirical Password Datasets.
Jeremiah Blocki
Peiyuan Liu
2023
conf/sp
Confident Monte Carlo: Rigorous Analysis of Guessing Curves for Probabilistic Password Models.
Peiyuan Liu
Jeremiah Blocki
Wenjie Bai
2022
journals/popets
DALock: Password Distribution-Aware Throttling.
Jeremiah Blocki
Wuwei Zhang
2022
conf/crypto
Sustained Space and Cumulative Complexity Trade-Offs for Data-Dependent Memory-Hard Functions.
Jeremiah Blocki
Blake Holman
2022
conf/eurocrypt
On the Multi-user Security of Short Schnorr Signatures with Preprocessing.
Jeremiah Blocki
Seunghoon Lee
2022
conf/tcc
The Parallel Reversible Pebbling Game: Analyzing the Post-quantum Security of iMHFs.
Jeremiah Blocki
Blake Holman
Seunghoon Lee
2021
journals/compsec
Bicycle attacks considered harmful: Quantifying the damage of widespread password length leakage.
Benjamin Harsha
Robert Morton
Jeremiah Blocki
John A. Springer
Melissa Dark
2021
conf/fc
DAHash: Distribution Aware Tuning of Password Hashing Costs.
Wenjie Bai
Jeremiah Blocki
2019
conf/crypto
Data-Independent Memory Hard Functions: New Attacks and Stronger Constructions.
Jeremiah Blocki
Benjamin Harsha
Siteng Kang
Seunghoon Lee
Lu Xing
Samson Zhou
2018
conf/ccs
Bandwidth-Hard Functions: Reductions and Lower Bounds.
Jeremiah Blocki
Ling Ren
Samson Zhou
2018
conf/fc
On the Computational Complexity of Minimal Cumulative Cost Graph Pebbling.
Jeremiah Blocki
Samson Zhou
2018
conf/sp
On the Economics of Offline Password Cracking.
Jeremiah Blocki
Benjamin Harsha
Samson Zhou
2018
conf/eurosp
Just In Time Hashing.
Benjamin Harsha
Jeremiah Blocki
2018
conf/eurocrypt
Sustained Space Complexity.
Joël Alwen
Jeremiah Blocki
Krzysztof Pietrzak
2017
conf/ccs
Practical Graphs for Optimal Side-Channel Resistant Memory-Hard Functions.
Joël Alwen
Jeremiah Blocki
Benjamin Harsha
2017
conf/uss
Locally Differentially Private Protocols for Frequency Estimation.
Tianhao Wang
Jeremiah Blocki
Ninghui Li
Somesh Jha
2017
conf/eurosp
Towards Practical Attacks on Argon2i and Balloon Hashing.
Joël Alwen
Jeremiah Blocki
2017
conf/eurocrypt
Depth-Robust Graphs and Their Cumulative Memory Complexity.
Joël Alwen
Jeremiah Blocki
Krzysztof Pietrzak
2017
conf/tcc
On the Depth-Robustness and Cumulative Pebbling Cost of Argon2i.
Jeremiah Blocki
Samson Zhou
2016
conf/ccs
Client-CASH: Protecting Master Passwords against Offline Attacks.
Jeremiah Blocki
Anirudh Sridhar
2016
conf/crypto
Efficiently Computing Data-Independent Memory-Hard Functions.
Joël Alwen
Jeremiah Blocki
2016
conf/ndss
Differentially Private Password Frequency Lists.
Jeremiah Blocki
Anupam Datta
Joseph Bonneau
2016
conf/tcc
Designing Proof of Human-Work Puzzles for Cryptocurrency and Beyond.
Jeremiah Blocki
Hong-Sheng Zhou
2015
conf/ndss
Spaced Repetition and Mnemonics Enable Recall of Multiple Strong Passwords.
Jeremiah Blocki
Saranga Komanduri
Lorrie Faith Cranor
Anupam Datta
2013
conf/ccs
GOTCHA password hackers!
Jeremiah Blocki
Manuel Blum
Anupam Datta
2013
conf/asiacrypt
Naturally Rehearsing Passwords.
Jeremiah Blocki
Manuel Blum
Anupam Datta
2011
conf/uss
Audit Mechanisms for Privacy Protection in Healthcare Environments.
Jeremiah Blocki
Nicolas Christin
Anupam Datta
Arunesh Sinha
2011
conf/uss
Take Two Software Updates and See Me in the Morning: The Case for Software Security Evaluations of Medical Devices.
Steve Hanna
Rolf Rolles
Andres Molina-Markham
Pongsin Poosankam
Jeremiah Blocki
Kevin Fu
Dawn Song
2011
conf/iciss
Understanding and Protecting Privacy: Formal Semantics and Principled Audit Mechanisms.
Anupam Datta
Jeremiah Blocki
Nicolas Christin
Henry DeYoung
Deepak Garg
Limin Jia
Dilsun Kirli Kaynar
Arunesh Sinha
Coauthors
Andres Molina-Markham
(1)
Anirudh Sridhar
(1)
Anupam Datta
(6)
Arunesh Sinha
(2)
Benjamin Harsha
(5)
Blake Holman
(3)
Dawn Song
(1)
Deepak Garg
(1)
Dilsun Kirli Kaynar
(1)
Henry DeYoung
(1)
Hong-Sheng Zhou
(1)
Jeremiah Blocki
(33)
Joël Alwen
(5)
John A. Springer
(1)
Joseph Bonneau
(1)
Kevin Fu
(1)
Krzysztof Pietrzak
(2)
Limin Jia
(1)
Ling Ren
(2)
Lorrie Faith Cranor
(1)
Lu Xing
(1)
Manuel Blum
(2)
Melissa Dark
(1)
Mohammad Hassan Ameri
(1)
Nicolas Christin
(2)
Ninghui Li
(1)
Peiyuan Liu
(3)
Pongsin Poosankam
(1)
Robert Morton
(1)
Rolf Rolles
(1)
Samson Zhou
(6)
Saranga Komanduri
(1)
Seunghoon Lee
(5)
Siteng Kang
(1)
Somesh Jha
(1)
Steve Hanna
(1)
Tianhao Wang
(1)
Wenjie Bai
(2)
Wuwei Zhang
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to