What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Ian Goldberg
Google Scholar
67
publications in security and cryptology related venues
Year
Venue
Title
2025
journals/popets
TEEMS: A Trusted Execution Environment based Metadata-protected Messaging System.
Sajin Sasy
Aaron Johnson
Ian Goldberg
2025
conf/pkc
Arctic: Lightweight and Stateless Threshold Schnorr Signatures.
Chelsea Komlo
Ian Goldberg
2024
journals/popets
PRAC: Round-Efficient 3-Party MPC for Dynamic Data Structures.
Sajin Sasy
Adithya Vadapalli
Ian Goldberg
2024
journals/popets
SoK: Metadata-Protecting Communication Systems.
Sajin Sasy
Ian Goldberg
2023
journals/popets
Lox: Protecting the Social Graph in Bridge Distribution.
Lindsey Tulloch
Ian Goldberg
2023
conf/ccs
Waks-On/Waks-Off: Fast Oblivious Offline/Online Shuffling and Sorting with Waksman Networks.
Sajin Sasy
Aaron Johnson
Ian Goldberg
2023
conf/uss
Duoram: A Bandwidth-Efficient Distributed ORAM for 2- and 3-Party Computation.
Adithya Vadapalli
Ryan Henry
Ian Goldberg
2022
conf/ccs
Fast Fully Oblivious Compaction and Shuffling.
Sajin Sasy
Aaron Johnson
Ian Goldberg
2022
conf/acns
Astrape: Anonymous Payment Channels with Boring Cryptography.
Yuhao Dong
Ian Goldberg
Sergey Gorbunov
Raouf Boutaba
2022
conf/acns
Improving the Privacy of Tor Onion Services.
Edward Eaton
Sajin Sasy
Ian Goldberg
2021
journals/popets
SoK: Privacy-Preserving Reputation Systems.
Stan Gurtler
Ian Goldberg
2021
conf/uss
Once is Never Enough: Foundations for Sound Statistical Inference in Tor Network Experimentation.
Rob Jansen
Justin Tracey
Ian Goldberg
2020
journals/popets
Mind the Gap: Ceremonies for Applied Secret Sharing.
Bailey Kacsmar
Chelsea Komlo
Florian Kerschbaum
Ian Goldberg
2020
journals/popets
Mitigator: Privacy policy compliance using trusted hardware.
Miti Mazmudar
Ian Goldberg
2020
conf/uss
Walking Onions: Scaling Anonymity Networks while Protecting Users.
Chelsea Komlo
Nick Mathewson
Ian Goldberg
2020
conf/sacrypt
FROST: Flexible Round-Optimized Schnorr Threshold Signatures.
Chelsea Komlo
Ian Goldberg
2019
journals/popets
ConsenSGX: Scaling Anonymous Communications Networks with Trusted Execution Environments.
Sajin Sasy
Ian Goldberg
2018
journals/popets
Improved Strongly Deniable Authenticated Key Exchanges for Secure Messaging.
Nik Unger
Ian Goldberg
2018
journals/popets
Secure asymmetry and deployability for decoy routing systems.
Cecylia Bocovich
Ian Goldberg
2018
journals/popets
Privacy Pass: Bypassing Internet Challenges Anonymously.
Alex Davidson
Ian Goldberg
Nick Sullivan
George Tankersley
Filippo Valsorda
2018
conf/uss
High Performance Tor Experimentation from the Magic of Dynamic ELFs.
Justin Tracey
Rob Jansen
Ian Goldberg
2018
conf/ndss
Settling Payments Fast and Private: Efficient Decentralized Routing for Path-Based Transactions.
Stefanie Roos
Pedro Moreno-Sanchez
Aniket Kate
Ian Goldberg
2017
conf/uss
Walkie-Talkie: An Efficient Defense Against Passive Website Fingerprinting Attacks.
Tao Wang
Ian Goldberg
2017
conf/uss
Live Lesson: Netsim: Network simulation and hacking for high schoolers.
Erinn Atwater
Cecylia Bocovich
Urs Hengartner
Ian Goldberg
2017
conf/fc
Lavinia: An Audit-Payment Protocol for Censorship-Resistant Storage.
Cecylia Bocovich
John A. Doucette
Ian Goldberg
2016
journals/popets
SoK: Making Sense of Censorship Resistance Systems.
Sheharbano Khattak
Tariq Elahi
Laurent Simon
Colleen M. Swanson
Steven J. Murdoch
Ian Goldberg
2016
journals/popets
Lower-Cost ∈-Private Information Retrieval.
Raphael R. Toledo
George Danezis
Ian Goldberg
2016
journals/popets
On Realistically Attacking Tor with Website Fingerprinting.
Tao Wang
Ian Goldberg
2016
journals/popets
A Framework for the Game-theoretic Analysis of Censorship Resistance.
Tariq Elahi
John A. Doucette
Hadi Hosseini
Steven J. Murdoch
Ian Goldberg
2016
conf/ccs
Slitheen: Perfectly Imitated Decoy Routing through Traffic Replacement.
Cecylia Bocovich
Ian Goldberg
2016
conf/acns
Low-Cost Mitigation Against Cold Boot Attacks for an Authentication Token.
Ian Goldberg
Graeme Jenkinson
Frank Stajano
2015
journals/popets
DP5: A Private Presence Service.
Nikita Borisov
George Danezis
Ian Goldberg
2015
conf/ccs
Deniable Key Exchanges for Secure Messaging.
Nik Unger
Ian Goldberg
2015
conf/fc
Sublinear Scaling for Multi-Client Private Information Retrieval.
Wouter Lueks
Ian Goldberg
2015
conf/sp
SoK: Secure Messaging.
Nik Unger
Sergej Dechand
Joseph Bonneau
Sascha Fahl
Henning Perl
Ian Goldberg
Matthew Smith
2015
conf/soups
Leading Johnny to Water: Designing for Usability and Trust.
Erinn Atwater
Cecylia Bocovich
Urs Hengartner
Ed Lank
Ian Goldberg
2014
conf/ccs
A Systematic Approach to Developing and Evaluating Website Fingerprinting Defenses.
Xiang Cai
Rishab Nithyanand
Tao Wang
Rob Johnson
Ian Goldberg
2014
conf/ccs
PrivEx: Private Collection of Traffic Statistics for Anonymous Communication Networks.
Tariq Elahi
George Danezis
Ian Goldberg
2014
conf/uss
Effective Attacks and Provable Defenses for Website Fingerprinting.
Tao Wang
Xiang Cai
Rishab Nithyanand
Rob Johnson
Ian Goldberg
2013
conf/ccs
PCTCP: per-circuit TCP-over-IPsec transport for anonymous communication overlay networks.
Mashael AlSabah
Ian Goldberg
2013
conf/acns
Batch Proofs of Partial Knowledge.
Ryan Henry
Ian Goldberg
2013
conf/ndss
One (Block) Size Fits All: PIR and SPIR with Variable-Length Records via Multi-Block Queries.
Ryan Henry
Yizhou Huang
Ian Goldberg
2012
conf/ccs
Adding query privacy to robust DHTs.
Michael Backes
Ian Goldberg
Aniket Kate
Tomas Toft
2012
conf/ccs
SkypeMorph: protocol obfuscation for Tor bridges.
Hooman Mohajeri Moghaddam
Baiyu Li
Mohammad Derakhshani
Ian Goldberg
2012
conf/ccs
Enhancing Tor's performance using real-time traffic classification.
Mashael AlSabah
Kevin S. Bauer
Ian Goldberg
2012
conf/uss
Optimally Robust Private Information Retrieval.
Casey Devet
Ian Goldberg
Nadia Heninger
2012
conf/fc
Congestion-Aware Path Selection for Tor.
Tao Wang
Kevin S. Bauer
Clara Forero
Ian Goldberg
2011
conf/ccs
Practical PIR for electronic commerce.
Ryan Henry
Femi G. Olumofin
Ian Goldberg
2011
conf/uss
Telex: Anticensorship in the Network Infrastructure.
Eric Wustrow
Scott Wolchok
Ian Goldberg
J. Alex Halderman
2011
conf/uss
PIR-Tor: Scalable Anonymous Communication Using Private Information Retrieval.
Prateek Mittal
Femi G. Olumofin
Carmela Troncoso
Nikita Borisov
Ian Goldberg
2011
conf/fc
Revisiting the Computational Practicality of Private Information Retrieval.
Femi G. Olumofin
Ian Goldberg
2011
conf/sp
Formalizing Anonymous Blacklisting Systems.
Ryan Henry
Ian Goldberg
2011
conf/sp
Extending Nymble-like Systems.
Ryan Henry
Ian Goldberg
2010
conf/ccs
An improved algorithm for tor circuit scheduling.
Can Tang
Ian Goldberg
2010
conf/fc
Using Sphinx to Improve Onion Routing Circuit Construction.
Aniket Kate
Ian Goldberg
2010
conf/asiacrypt
Constant-Size Commitments to Polynomials and Their Applications.
Aniket Kate
Gregory M. Zaverucha
Ian Goldberg
2009
conf/ccs
Multi-party off-the-record messaging.
Ian Goldberg
Berkant Ustaoglu
Matthew Van Gundy
Hao Chen
2009
conf/uss
Improving Tor using a TCP-over-DTLS Tunnel.
Joel Reardon
Ian Goldberg
2009
conf/sp
Sphinx: A Compact and Provably Secure Mix Format.
George Danezis
Ian Goldberg
2009
conf/acns
A New Message Recognition Protocol with Self-recoverability for Ad Hoc Pervasive Networks.
Ian Goldberg
Atefeh Mashatan
Douglas R. Stinson
2008
conf/soups
A user study of off-the-record messaging.
Ryan Stedman
Kayo Yoshida
Ian Goldberg
2007
conf/sp
Improving the Robustness of Private Information Retrieval.
Ian Goldberg
2002
conf/fc
Privacy Tradeoffs: Myth or Reality? Panel.
Rebecca N. Wright
L. Jean Camp
Ian Goldberg
Ronald L. Rivest
Graham Wood
2001
conf/ccs
A Cryptanalysis of the High-Bandwidth Digital Content Protection System.
Scott A. Crosby
Ian Goldberg
Robert Johnson
Dawn Xiaodong Song
David A. Wagner
2000
conf/asiacrypt
Proofs of Security for the Unix Password Hashing Algorithm.
David A. Wagner
Ian Goldberg
1999
conf/icics
Reaction Attacks against several Public-Key Cryptosystems.
Chris Hall
Ian Goldberg
Bruce Schneier
1996
conf/uss
A Secure Environment for Untrusted Helper Applications.
Ian Goldberg
David A. Wagner
Randi Thomas
Eric A. Brewer
Coauthors
Aaron Johnson
(3)
Adithya Vadapalli
(2)
Alex Davidson
(1)
Aniket Kate
(4)
Atefeh Mashatan
(1)
Bailey Kacsmar
(1)
Baiyu Li
(1)
Berkant Ustaoglu
(1)
Bruce Schneier
(1)
Can Tang
(1)
Carmela Troncoso
(1)
Casey Devet
(1)
Cecylia Bocovich
(5)
Chelsea Komlo
(4)
Chris Hall
(1)
Clara Forero
(1)
Colleen M. Swanson
(1)
David A. Wagner
(3)
Dawn Xiaodong Song
(1)
Douglas R. Stinson
(1)
Ed Lank
(1)
Edward Eaton
(1)
Eric A. Brewer
(1)
Eric Wustrow
(1)
Erinn Atwater
(2)
Femi G. Olumofin
(3)
Filippo Valsorda
(1)
Florian Kerschbaum
(1)
Frank Stajano
(1)
George Danezis
(4)
George Tankersley
(1)
Graeme Jenkinson
(1)
Graham Wood
(1)
Gregory M. Zaverucha
(1)
Hadi Hosseini
(1)
Hao Chen
(1)
Henning Perl
(1)
Hooman Mohajeri Moghaddam
(1)
Ian Goldberg
(67)
J. Alex Halderman
(1)
Joel Reardon
(1)
John A. Doucette
(2)
Joseph Bonneau
(1)
Justin Tracey
(2)
Kayo Yoshida
(1)
Kevin S. Bauer
(2)
L. Jean Camp
(1)
Laurent Simon
(1)
Lindsey Tulloch
(1)
Mashael AlSabah
(2)
Matthew Smith
(1)
Matthew Van Gundy
(1)
Michael Backes
(1)
Miti Mazmudar
(1)
Mohammad Derakhshani
(1)
Nadia Heninger
(1)
Nick Mathewson
(1)
Nick Sullivan
(1)
Nik Unger
(3)
Nikita Borisov
(2)
Pedro Moreno-Sanchez
(1)
Prateek Mittal
(1)
Randi Thomas
(1)
Raouf Boutaba
(1)
Raphael R. Toledo
(1)
Rebecca N. Wright
(1)
Rishab Nithyanand
(2)
Rob Jansen
(2)
Rob Johnson
(2)
Robert Johnson
(1)
Ronald L. Rivest
(1)
Ryan Henry
(6)
Ryan Stedman
(1)
Sajin Sasy
(7)
Sascha Fahl
(1)
Scott A. Crosby
(1)
Scott Wolchok
(1)
Sergej Dechand
(1)
Sergey Gorbunov
(1)
Sheharbano Khattak
(1)
Stan Gurtler
(1)
Stefanie Roos
(1)
Steven J. Murdoch
(2)
Tao Wang
(5)
Tariq Elahi
(3)
Tomas Toft
(1)
Urs Hengartner
(2)
Wouter Lueks
(1)
Xiang Cai
(2)
Yizhou Huang
(1)
Yuhao Dong
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to