What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Joseph Bonneau
Google Scholar
45
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/eurocrypt
Good Things Come to Those Who Wait - Dishonest-Majority Coin-Flipping Requires Delay Functions.
Joseph Bonneau
Benedikt Bünz
Miranda Christ
Yuval Efron
2025
conf/crypto
Merkle Mountain Ranges are Optimal: On Witness Update Frequency for Cryptographic Accumulators.
Joseph Bonneau
Jessica Chen
Miranda Christ
Ioanna Karantaidou
2024
journals/popets
NOTRY: Deniable messaging with retroactive avowal.
Faxing Wang
Shaanan Cohney
Riad S. Wahby
Joseph Bonneau
2024
conf/ccs
Atomic and Fair Data Exchange via Blockchain.
Ertem Nusret Tas
István András Seres
Yinuo Zhang
Márk Melczer
Mahimna Kelkar
Joseph Bonneau
Valeria Nikolaenko
2024
conf/fc
Short Paper: Naysayer Proofs.
István András Seres
Noemi Glaeser
Joseph Bonneau
2024
conf/acns
Powers-of-Tau to the People: Decentralizing Setup Ceremonies.
Valeria Nikolaenko
Sam Ragsdale
Joseph Bonneau
Dan Boneh
2023
conf/ccs
Riggs: Decentralized Sealed-Bid Auctions.
Nirvan Tyagi
Arasu Arun
Cody Freitag
Riad S. Wahby
Joseph Bonneau
David Mazières
2023
conf/fc
Limits on Revocable Proof Systems, With Implications for Stateless Blockchains.
Miranda Christ
Joseph Bonneau
2023
conf/fc
Proof of Necessary Work: Succinct State Verification with Fairness Guarantees.
Assimakis Kattis
Joseph Bonneau
2023
conf/fc
Bicorn: An Optimistically Efficient Distributed Randomness Beacon.
Kevin Choi
Arasu Arun
Nirvan Tyagi
Joseph Bonneau
2023
conf/sp
SoK: Distributed Randomness Beacons.
Kevin Choi
Aathira Manoj
Joseph Bonneau
2022
conf/ccs
VeRSA: Verifiable Registries with Efficient Client Audits from RSA Authenticated Dictionaries.
Nirvan Tyagi
Ben Fisch
Andrew Zitek
Joseph Bonneau
Stefano Tessaro
2022
conf/uss
Zero-Knowledge Middleboxes.
Paul Grubbs
Arasu Arun
Ye Zhang
Joseph Bonneau
Michael Walfish
2022
conf/asiacrypt
Short-lived Zero-Knowledge Proofs and Signatures.
Arasu Arun
Joseph Bonneau
Jeremy Clark
2019
conf/soups
"I was told to buy a software or lose my computer. I ignored it": A study of ransomware.
Camelia Simoiu
Joseph Bonneau
Christopher Gates
Sharad Goel
2018
conf/crypto
Verifiable Delay Functions.
Dan Boneh
Joseph Bonneau
Benedikt Bünz
Ben Fisch
2018
conf/fc
Hostile Blockchain Takeovers (Short Paper).
Joseph Bonneau
2017
journals/popets
Certificate Transparency with Privacy.
Saba Eskandarian
Eran Messeri
Joseph Bonneau
Dan Boneh
2017
conf/fc
Escrow Protocols for Cryptocurrencies: How to Buy Physical Goods Using Bitcoin.
Steven Goldfeder
Joseph Bonneau
Rosario Gennaro
Arvind Narayanan
2017
conf/sp
Obstacles to the Adoption of Secure Communication Tools.
Ruba Abu-Salma
M. Angela Sasse
Joseph Bonneau
Anastasia Danilova
Alena Naiakshina
Matthew Smith
2016
conf/fc
The Bitcoin Brain Drain: Examining the Use and Abuse of Bitcoin Brain Wallets.
Marie Vasek
Joseph Bonneau
Ryan Castellucci
Cameron Keith
Tyler Moore
2016
conf/fc
Why Buy When You Can Rent? - Bribery Attacks on Bitcoin-Style Consensus.
Joseph Bonneau
2016
conf/fc
EthIKS: Using Ethereum to Audit a CONIKS Key Transparency Log.
Joseph Bonneau
2016
conf/fc
Incentive Compatibility of Bitcoin Mining Pool Reward Functions.
Okke Schrijvers
Joseph Bonneau
Dan Boneh
Tim Roughgarden
2016
conf/ndss
Differentially Private Password Frequency Lists.
Jeremiah Blocki
Anupam Datta
Joseph Bonneau
2015
conf/ccs
Provisions: Privacy-preserving Proofs of Solvency for Bitcoin Exchanges.
Gaby G. Dagher
Benedikt Bünz
Joseph Bonneau
Jeremy Clark
Dan Boneh
2015
conf/ccs
POSTER: Secure Chat for the Masses? User-centered Security to the Rescue.
Ruba Abu-Salma
M. Angela Sasse
Joseph Bonneau
Matthew Smith
2015
conf/uss
CONIKS: Bringing Key Transparency to End Users.
Marcela S. Melara
Aaron Blankstein
Joseph Bonneau
Edward W. Felten
Michael J. Freedman
2015
conf/sp
SoK: Secure Messaging.
Nik Unger
Sergej Dechand
Joseph Bonneau
Sascha Fahl
Henning Perl
Ian Goldberg
Matthew Smith
2015
conf/sp
SoK: Research Perspectives and Challenges for Bitcoin and Cryptocurrencies.
Joseph Bonneau
Andrew Miller
Jeremy Clark
Arvind Narayanan
Joshua A. Kroll
Edward W. Felten
2015
conf/sp
Cracking-Resistant Password Vaults Using Natural Language Encoders.
Rahul Chatterjee
Joseph Bonneau
Ari Juels
Thomas Ristenpart
2015
conf/soups
Learning Assigned Secrets for Unlocking Mobile Devices.
Stuart E. Schechter
Joseph Bonneau
2015
conf/ndss
Upgrading HTTPS in mid-air: An empirical study of strict transport security and key pinning.
Michael J. Kranch
Joseph Bonneau
2014
conf/uss
Towards Reliable Storage of 56-bit Secrets in Human Memory.
Joseph Bonneau
Stuart E. Schechter
2014
conf/fc
Mixcoin: Anonymity for Bitcoin with Accountable Mixes.
Joseph Bonneau
Arvind Narayanan
Andrew Miller
Jeremy Clark
Joshua A. Kroll
Edward W. Felten
2014
conf/ndss
The Tangled Web of Password Reuse.
Anupam Das
Joseph Bonneau
Matthew Caesar
Nikita Borisov
XiaoFeng Wang
2012
conf/fc
A Birthday Present Every Eleven Wallets? The Security of Customer-Chosen Banking PINs.
Joseph Bonneau
Sören Preibusch
Ross J. Anderson
2012
conf/fc
Linguistic Properties of Multi-word Passphrases.
Joseph Bonneau
Ekaterina Shutova
2012
conf/fc
It's Not Stealing If You Need It: A Panel on the Ethics of Performing Research Using Public Data of Illicit Origin.
Serge Egelman
Joseph Bonneau
Sonia Chiasson
David Dittrich
Stuart E. Schechter
2012
conf/sp
The Science of Guessing: Analyzing an Anonymized Corpus of 70 Million Passwords.
Joseph Bonneau
2012
conf/sp
The Quest to Replace Passwords: A Framework for Comparative Evaluation of Web Authentication Schemes.
Joseph Bonneau
Cormac Herley
Paul C. van Oorschot
Frank Stajano
2010
conf/fc
What's in a Name?
Joseph Bonneau
Mike Just
Greg Matthews
2009
conf/soups
Privacy stories: confidence in privacy behaviors through end user programming.
Luke Church
Jonathan Anderson
Joseph Bonneau
Frank Stajano
2009
conf/soups
Privacy suites: shared privacy for social networks.
Joseph Bonneau
Jonathan Anderson
Luke Church
2006
conf/ches
Cache-Collision Timing Attacks Against AES.
Joseph Bonneau
Ilya Mironov
Coauthors
Aaron Blankstein
(1)
Aathira Manoj
(1)
Alena Naiakshina
(1)
Anastasia Danilova
(1)
Andrew Miller
(2)
Andrew Zitek
(1)
Anupam Das
(1)
Anupam Datta
(1)
Arasu Arun
(4)
Ari Juels
(1)
Arvind Narayanan
(3)
Assimakis Kattis
(1)
Ben Fisch
(2)
Benedikt Bünz
(3)
Camelia Simoiu
(1)
Cameron Keith
(1)
Christopher Gates
(1)
Cody Freitag
(1)
Cormac Herley
(1)
Dan Boneh
(5)
David Dittrich
(1)
David Mazières
(1)
Edward W. Felten
(3)
Ekaterina Shutova
(1)
Eran Messeri
(1)
Ertem Nusret Tas
(1)
Faxing Wang
(1)
Frank Stajano
(2)
Gaby G. Dagher
(1)
Greg Matthews
(1)
Henning Perl
(1)
Ian Goldberg
(1)
Ilya Mironov
(1)
Ioanna Karantaidou
(1)
István András Seres
(2)
Jeremiah Blocki
(1)
Jeremy Clark
(4)
Jessica Chen
(1)
Jonathan Anderson
(2)
Joseph Bonneau
(45)
Joshua A. Kroll
(2)
Kevin Choi
(2)
Luke Church
(2)
M. Angela Sasse
(2)
Mahimna Kelkar
(1)
Marcela S. Melara
(1)
Marie Vasek
(1)
Márk Melczer
(1)
Matthew Caesar
(1)
Matthew Smith
(3)
Michael J. Freedman
(1)
Michael J. Kranch
(1)
Michael Walfish
(1)
Mike Just
(1)
Miranda Christ
(3)
Nik Unger
(1)
Nikita Borisov
(1)
Nirvan Tyagi
(3)
Noemi Glaeser
(1)
Okke Schrijvers
(1)
Paul C. van Oorschot
(1)
Paul Grubbs
(1)
Rahul Chatterjee
(1)
Riad S. Wahby
(2)
Rosario Gennaro
(1)
Ross J. Anderson
(1)
Ruba Abu-Salma
(2)
Ryan Castellucci
(1)
Saba Eskandarian
(1)
Sam Ragsdale
(1)
Sascha Fahl
(1)
Serge Egelman
(1)
Sergej Dechand
(1)
Shaanan Cohney
(1)
Sharad Goel
(1)
Sonia Chiasson
(1)
Sören Preibusch
(1)
Stefano Tessaro
(1)
Steven Goldfeder
(1)
Stuart E. Schechter
(3)
Thomas Ristenpart
(1)
Tim Roughgarden
(1)
Tyler Moore
(1)
Valeria Nikolaenko
(2)
XiaoFeng Wang
(1)
Ye Zhang
(1)
Yinuo Zhang
(1)
Yuval Efron
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to