Mitigating Trauma in Qualitative Research Infrastructure: Roles for Machine Assistance and Trauma-Informed Design
Emily Tseng, Thomas Ristenpart, and Nicola Dell
Proceedings of the ACM on Human-Computer Interaction - CSCW 2025

Is ML-Based Cryptanalysis Inherently Limited? Simulating Cryptographic Adversaries via Gradient-Based Methods
Avital Shafran, Eran Malach, Thomas Ristenpart, Gil Segev, and Stefano Tessaro
Advances in Cryptology - Crypto 2024

Navigating Traumatic Stress Reactions During Computer Security Interventions
Lana Ramjit, Natalie Dolci, Francesca Rossi, Ryan Garcia, Thomas Ristenpart, and Dana Cuomo
USENIX Security 2024

Exploiting Leakage in Password Managers via Injection Attacks
Andrés Fábrega, Armin Namavari, Rachit Agarwal, Ben Nassi, and Thomas Ristenpart
USENIX Security 2024

Data Stewardship in Clinical Computer Security: Balancing Burden and Benefit in Participatory Systems
Emily Tseng, Rosanna Bellini, Yeuk Yu Lee, Alana Ramjit, Thomas Ristenpart, and Nicola Dell
Proceedings of the ACM on Human-Computer Interaction - CSCW 2024

Private Hierarchical Governance for Encrypted Messaging
Armin Namavari, Barry Wang, Sanketh Menda, Ben Nassi, Nirvan Tyagi, James Grimmelman, Amy Zhang, and Thomas Ristenpart
IEEE Symposium on Security and Privacy - Oakland 2024

SoK: Safer Digital-Safety Research Involving At-Risk Users
Rosanna Bellini, Emily Tseng, Noel Warford, Alaa Daffalla, Tara Matthews, Sunny Consolvo, Jill Palzkill Woelfer, Patrick Kelley, Michelle Mazurek, Dana Cuomo, Nicola Dell, and Thomas Ristenpart
IEEE Symposium on Security and Privacy - Oakland 2024

Injection Attacks against End-to-End Encrypted Applications
Andrés Fábrega, Carolina Ortega Pérez, Armin Namavari, Ben Nassi, Rachit Agarwal, and Thomas Ristenpart
IEEE Symposium on Security and Privacy - Oakland 2024

Account Security Interfaces: Important, Unintuitive, and Untrustworthy
Alaa Daffalla, Marina Bohuk, Nicola Dell, Rosanna Bellini, and Thomas Ristenpart
USENIX Security 2023
Received a Distinguished Paper Award

The Digital-Safety Risks of Financial Technologies for Survivors of Intimate Partner Violence
Rosanna Bellini, Kevin Lee, Megan A. Brown, Jeremy Shaffer, Rasika Bhalerao, and Thomas Ristenpart
USENIX Security 2023

Context Discovery and Commitment Attacks: How to Break CCM, EAX, SIV, and More
Sanketh Menda, Julia Len, Paul Grubbs, and Thomas Ristenpart
Advances in Cryptology - Eurocrypt 2023

Araña: Discovering and Characterizing Password Guessing Attacks in Practice
Mazharul Islam, Marina Sanusi Bohuk, Paul Chung, Thomas Ristenpart, and Rahul Chatterjee
USENIX Security 2023

Authenticated Encryption with Key Identification
Julia Len, Paul Grubbs, and Thomas Ristenpart
Advances in Cryptology - Asiacrypt 2022

Characterizing Alternative Monetization Strategies on YouTube
Yiqing Hua, Manoel Horta Ribeiro, Thomas Ristenpart, Robert West, and Mor Naaman.
Proceedings of the ACM on Human-Computer Interaction - CSCW 2022

Gossamer: Securely Measuring Password-based Logins
Marina Sanusi Bohuk, Mazharul Islam, Suleman Ahmad, Michael Swift, Thomas Ristenpart, and Rahul Chatterjee.
USENIX Security 2022

Might I Get Pwned: A Second Generation Password Breach Alerting Service
Bijeeta Pal, Mazharul Islam, Marina Sanusi, Nick Sullivan, Luke Valenta, Tara Whalen, Christopher Wood, Thomas Ristenpart, and Rahul Chatterjee.
USENIX Security 2022

Orca: Blocklisting in Sender-Anonymous Messaging
Nirvan Tyagi, Julia Len, Ian Miers, Thomas Ristenpart.
USENIX Security 2022

Increasing Adversarial Uncertainty to Scale Private Similarity Testing
Yiqing Hua, Armin Namavari, Kaishuo Cheng, Mor Naaman, and Thomas Ristenpart.
USENIX Security 2022

A Fast and Simple Partially Oblivious PRF, with Applications
Nirvan Tyagi, Sofı́a Celi, Thomas Ristenpart, Nick Sullivan, Stefano Tessaro, and Christopher A. Wood.
Advances in Cryptology - Eurocrypt 2022

Trauma-Informed Computing: Towards Safer Technology Experiences for All
Janet X. Chen, Allison McDonald, Yixin Zou, Emily Tseng, Kevin A. Roundy, Acar Tamersoy, Florian Schaub, Thomas Ristenpart, and Nicola Dell.
ACM Conference on Human Factors in Computing Systems - CHI 2022

Care Infrastructures for Digital Security in Intimate Partner Violence.
Emily Tseng, Mehrnaz Sabet, Rosanna Bellini, Harkiran Kaur Sodhi, Thomas Ristenpart, and Nicola Dell.
ACM Conference on Human Factors in Computing Systems - CHI 2022
Received a Best Paper Award

The Role of Computer Security Customer Support in Helping Survivors of Intimate Partner Violence
Yixin Zou, Allison McDonald, Julia Narakornpichit, Nicola Dell, Thomas Ristenpart, Kevin Roundy, Florian Schaub, and Acar Tamersoy.
USENIX Security 2021

Searching Encrypted Data with Size-Locked Indexes
Min Xu, Armin Namavari, David Cash, and Thomas Ristenpart
USENIX Security 2021

Partitioning Oracle Attacks
Julia Len, Paul Grubbs, and Thomas Ristenpart
USENIX Security 2021

A Digital Safety Dilemma: Analysis of Remote Computer-Mediated Computer Security Interventions During COVID-19
Emily Tseng, Diana Freed, Kristen Engel, Thomas Ristenpart, and Nicola Dell
Conference on Human Factors in Computing - CHI 2021

SoK: Hate, Harassment, and the Changing Landscape of Online Abuse
Kurt Thomas, Devdatta Akhawe, Michael Bailey, Dan Boneh, Elie Bursztein, Sunny Consolvo, Nicola Dell, Zakir Durumeric, Patrick Gage Kelley, Deepak Kumar, Damon McCoy, Sarah Meiklejohn, Thomas Ristenpart, and Gianluca Stringhini
IEEE Symposium on Security and Privacy - Oakland 2021

"So-called Privacy Breeds Evil": Narrative Justifications for Intimate Partner Surveillance in Online Forums
Rosanna Bellini, Emily Tseng, Nora McDonald, Rachel Greenstadt, Damon McCoy, Thomas Ristenpart, and Nicola Dell
Proceedings of the ACM on Human-Computer Interaction - CSCW 2020
Received a Best Paper Award

Pancake: Frequency Smoothing for Encrypted Data Stores
Paul Grubbs, Anurag Khandelwal, Marie-Sarah Lacharite, Lloyd Brown, Lucy Li, Rachit Agarwal, and Thomas Ristenpart
USENIX Security 2020
Received a Distinguished Paper Award

The Tools and Tactics Used in Intimate Partner Surveillance: An Analysis of Online Infidelity Forums
Emily Tseng, Rosanna Bellini, Nora McDonald, Matan Danos, Rachel Greenstadt, Damon McCoy, Nicola Dell, and Thomas Ristenpart
USENIX Security 2020
Received a Distinguished Paper Award and Internet Defense Prize (third prize)

The Many Kinds of Creepware Used for Inter-Personal Attacks
Kevin Roundy, Paula Barmaimon, Nicola Dell, Damon McCoy, Daniel Nissani, Thomas Ristenpart, and Acar Tamersoy
IEEE Symposium on Security and Privacy - Oakland 2020

Characterizing Twitter Users Who Engage in Adversarial Interactions against Political Candidates
Yiqing Hua, Mor Naaman, and Thomas Ristenpart
Conference on Human Factors in Computing - CHI 2020
Received an Honorable Mention Award

Towards Measuring Adversarial Twitter Interactions against Candidates in the US Midterm Elections
Yiqing Hua, Thomas Ristenpart, and Mor Naaman
ICWSM 2020

Protocols for Checking Compromised Credentials
Lucy Li, Bijeeta Pal, Junade Ali, Nick Sullivan, Rahul Chatterjee, and Thomas Ristenpart
Computer and Communications Security - CCS 2019

Traceback for End-to-End Encrypted Messaging
Nirvan Tyagi, Ian Miers, and Thomas Ristenpart
Computer and Communications Security - CCS 2019

"Is my phone hacked?" Analyzing Clinical Computer Security Interventions with Survivors of Intimate Partner Violence
Diana Freed, Sam Havron, Emily Tseng, Andrea Gallardo, Rahul Chatterjee, Thomas Ristenpart, and Nicola Dell.
Proceedings of the ACM on Human-Computer Interaction - CSCW 2019
Received an Honorable Mention Award

Asymmetric Message Franking: Content Moderation for Metadata-Private End-to-End Encryption
Nirvan Tyagi, Paul Grubbs, Julia Len, Ian Miers, and Thomas Ristenpart
Advances in Cryptology - Crypto 2019

Clinical Computer Security for Victims of Intimate Partner Violence
Sam Havron, Diana Freed, Rahul Chatterjee, Damon McCoy, Nicola Dell, and Thomas Ristenpart
USENIX Security 2019

Beyond Credential Stuffing: Password Similarity using Neural Networks
Bijeeta Pal, Tal Daniel, Rahul Chatterjee, and Thomas Ristenpart
IEEE Symposium on Security and Privacy - Oakland 2019

Blind Certificate Authorities
Liang Wang, Gilad Asharov, Rafael Pass, Thomas Ristenpart, and abhi shelat
IEEE Symposium on Security and Privacy - Oakland 2019

The Tao of Inference in Privacy-Protected Databases
Vincent Bindschaedler, Paul Grubbs, David Cash, Thomas Ristenpart, and Vitaly Shmatikov
Proceedings of the VLDB Endowment 2018

Fast Message Franking: From Invisible Salamanders to Encryptment
Yevgeniy Dodis, Paul Grubbs, Thomas Ristenpart, and Joanne Woodage
Advances in Cryptology - Crypto 2018

BurnBox: Self-Revocable Encryption in a World Of Compelled Access
Nirvan Tyagi, Muhammad Haris Mughees, Thomas Ristenpart, and Ian Miers
USENIX Security 2018

Peeking Behind the Curtains of Serverless Platforms
Liang Wang, Mengyuan Li, Yinqian Zhang, Thomas Ristenpart, and Michael Swift
USENIX ATC 2018

The Spyware Used in Intimate Partner Violence
Rahul Chatterjee, Periwinkle Doerfler, Hadas Orgad, Sam Havron, Jackeline Palmer, Diana Freed, Karen Levy, Nicola Dell, Damon McCoy, and Thomas Ristenpart
IEEE Symposium on Security and Privacy - Oakland 2018
Project webpage at https://ipvtechresearch.org

"A Stalker's Paradise": How Intimate Partners Abuse Technology
Diana Freed, Jackeline Palmer, Diana Minchala, Karen Levy, Thomas Ristenpart, and Nicola Dell
Conference on Human Factors in Computing Systems - CHI 2018
Received a Best Paper Award

Machine Learning Models that Remember Too Much
Congzheng Song, Thomas Ristenpart, and Vitaly Shmatikov
Computer and Communications Security - CCS 2017

The TypTop System: Personalized Typo-tolerant Password Checking
Rahul Chatterjee, Joanne Woodage, Yuval Pnueli, Anusha Chowdhury, and Thomas Ristenpart
Computer and Communications Security - CCS 2017
Project web page, executables, and source code availabe at https://typtop.info/

Digital Technologies and Intimate Partner Violence: A Qualitative Analysis with Multiple Stakeholders
Diana Freed, Jackeline Palmer, Diana Minchala, Karen Levy, Thomas Ristenpart, and Nicola Dell
Proceedings of the ACM on Human-Computer Interaction - CSCW 2017

Key Rotation for Authenticated Encryption
Adam Everspaugh, Kenneth G. Paterson, Thomas Ristenpart, and Sam Scott
Advances in Cryptology - Crypto 2017

Message Franking via Committing Authenticated Encryption
Paul Grubbs, Jiahui Lu, and Thomas Ristenpart
Advances in Cryptology - Crypto 2017

A New Distribution-Sensitive Secure Sketch and Popularity-Proportional Hashing
Joanne Woodage, Rahul Chatterjee, Yevgeniy Dodis, Ari Juels, and Thomas Ristenpart
Advances in Cryptology - Crypto 2017

Rethinking Security in the Era of Cloud Computing
Jay Aikat, Aditya Akella, Jeffrey Chase, Ari Juels, Michael Reiter, Thomas Ristenpart, Vyas Shekar, and Michael Swift
IEEE Security & Privacy 2017

Why Your Encrypted Database Is Not Secure
Paul Grubbs, Thomas Ristenpart, and Vitaly Shmatikov
HotOS 2017

Leakage-Abuse Attacks against Order-Revealing Encryption
Paul Grubbs, Kevin Sekniqi, Vincent Bindschaedler, Muhammad Naveed, and Thomas Ristenpart
IEEE Symposium on Security and Privacy - Oakland 2017

Side-Channel Attacks on Shared Search Indexes
Liang Wang, Paul Grubbs, Jiahui Lu, Vincent Bindschaedler, David Cash, and Thomas Ristenpart
IEEE Symposium on Security and Privacy - Oakland 2017

Modifying an Enciphering Scheme After Deployment
Paul Grubbs, Thomas Ristenpart, and Yuval Yarom
Advances in Cryptology - Eurocrypt 2017

Using Program Analysis to Synthesize Sensor Spoofing Attacks
Ivan Pustogarov, Thomas Ristenpart, and Vitaly Shmatikov
Asia CCS - 2017

Network Protocol Obfuscation and Automated Internet Censorship
Lucas Dixon, Thomas Ristenpart, and Thomas Shrimpton
IEEE Security and Privacy Magazine - 2016

Breaking Web Applications Built on Top of Encrypted Data
Paul Grubbs, Richard McPherson, Muhammad Naveed, Thomas Ristenpart, and Vitaly Shmatikov
Computer and Communications Security - CCS 2016

CQSTR: Securing Cross-tenant Applications with Cloud Containers
Yan Zhai, Lichao Yin, Jeffrey Chase, Thomas Ristenpart, and Michael Swift
Symposium on Cloud Computing 2016

Stealing Machine Learning Models via Prediction APIs
Florian Tramer, Fan Zhang, Ari Juels, Michael Reiter, and Thomas Ristenpart
USENIX Security 2016

Controlling UAVs with Sensor Input Spoofing Attacks
Drew Davidson, Hao Wu, Rob Jellinek, Vikas Singh, and Thomas Ristenpart
Workshop on Offensive Technologies - WOOT 2016

pASSWORD tYPOS and How to Correct Them Securely
Rahul Chatterjee, Anish Athalye, Devdatta Akhawe, Ari Juels, and Thomas Ristenpart
IEEE Symposium on Security and Privacy - Oakland 2016
Received Distinguished Student Paper Award

Honey Encryption Beyond Message Recovery Security
Joseph Jaeger, Thomas Ristenpart, and Qiang Tang
Advances in Cryptology - Eurocrypt 2016

Leakage-abuse Attacks against Searchable Encryption
David Cash, Paul Grubbs, Jason Perry, and Thomas Ristenpart
Computer and Communications Security - CCS 2015

Model Inversion Attacks that Exploit Confidence Information and Basic Countermeasures
Matthew Fredrikson, Somesh Jha, and Thomas Ristenpart
Computer and Communications Security - CCS 2015

Seeing through Network Protocol Obfuscation
Liang Wang, Kevin Dyer, Aditya Akella, Thomas Ristenpart, and Thomas Shrimpton
Computer and Communications Security - CCS 2015

The Pythia PRF Service
Adam Everspaugh, Rahul Chatterjee, Sam Scott, Ari Juels, and Thomas Ristenpart
USENIX Security 2015

A Placement Vulnerability Study in Multi-tenant Public Clouds
Venkatanathan Varadarajan, Yinqian Zhang, Thomas Ristenpart, and Michael Swift
USENIX Security 2015

Cracking-resistant Password Vaults using Natural Language Encoders
Rahul Chatterjee, Joseph Bonneau, Ari Juels, and Thomas Ristenpart
IEEE Symposium on Security and Privacy - Oakland 2015

A Formal Treatment of Backdoored Pseudorandom Generators
Yevgeniy Dodis, Chaya Ganesh, Alexander Golovnev, Ari Juels and Thomas Ristenpart
Advances in Cryptology - Eurocrypt 2015

Surreptitiously Weakening Cryptographic Systems
Bruce Schneier, Matthew Fredrikson, Tadayoshi Kohno, and Thomas Ristenpart
Unpublished survey article 2015

Cross-tenant Side-Channel Attacks in PaaS Clouds
Yinqian Zhang, Ari Juels, Michael Reiter, and Thomas Ristenpart
Computer and Communications Security - CCS 2014

Formatted Enryption Beyond Regular Languages
Daniel Luchaup, Thomas Shrimpton, Thomas Ristenpart, and Somesh Jha
Computer and Communications Security - CCS 2014

WhoWas: A Platform for Measuring Web Deployments on IaaS Clouds
Liang Wang, Antonio Nappa, Juan Caballero, Thomas Ristenpart, and Aditya Akella
Internet Measurement Conference - IMC 2014

Scheduler-based Defenses against Cross-VM Side-channels
Venkatanathan Varadarajan, Thomas Ristenpart, and Michael Swift
USENIX Security 2014

LibFTE: A Toolkit for Constructing Practical Format-Abiding Encryption Schemes
Daniel Luchaup, Kevin Dyer, Somesh Jha, Thomas Ristenpart, and Thomas Shrimpton
USENIX Security 2014

Privacy in Pharmacogenetics: An End-to-End Case Study of Personalized Warfarin Dosing
Matthew Fredrikson, Eric Lantz, Somesh Jha, Simon Lin, David Page, and Thomas Ristenpart
USENIX Security 2014
Received Best Paper Award

On the Practical Exploitability of Dual EC in TLS Implementations
Stephen Checkoway, Matt Fredrikson, Ruben Niederhagen, Adam Everspaugh, Matt Green, Tanja Lange, Thomas Ristenpart, Daniel J. Bernstein, Jake Maskiewicz, and Hovav Shacham
USENIX Security 2014

A Day Late and a Dollar Short: The Case for Research on Cloud Billing Systems
Robert Jellinek, Yan Zhai, Thomas Ristenpart, and Michael Swift
HotCloud 2014

Not-So-Random Numbers in Virtualized Linux and the Whirlwind RNG
Adam Everspaugh, Yan Zhai, Robert Jellinek, Thomas Ristenpart, and Michael Swift
IEEE Symposium on Security and Privacy - Oakland 2014
Project webpage at here

Honey Encryption: Security Beyond the Brute-force Barrier
Ari Juels and Thomas Ristenpart
Advances in Cryptology - Eurocrypt 2014

Protocol Misidentification Made Easy with Format-Transforming Encryption
Kevin Dyer, Scott Coull, Thomas Ristenpart, and Thomas Shrimpton
Computer and Communications Security - CCS 2013

Next Stop, the Cloud: Understanding Modern Web Service Deployment in EC2 and Azure
Keqiang He, Alexis Fisher, Liang Wang, Aaron Gembler, Aditya Akella, and Thomas Ristenpart
Internet Measurement Conference - IMC 2013

The Mix-and-Cut Shuffle: Small-domain Encryption Secure against N Queries
Thomas Ristenpart and Scott Yilek
Advances in Cryptology - Crypto 2013

DupLESS: Server-aided Encryption for Deduplicated Storage
Mihir Bellare, Sriram Keelveedhi, and Thomas Ristenpart
USENIX Security 2013

Fie on Firmware: Finding Vulnerabilities in Embedded Systems using Symbolic Execution
Drew Davidson, Benjamin Moench, Somesh Jha, and Thomas Ristenpart
USENIX Security 2013

Message-Locked Encryption and Secure Deduplication
Mihir Bellare, Sriram Keelveedhi, and Thomas Ristenpart
Advances in Cryptology - Eurocrypt 2013

More for Your Money: Exploiting Performance Heterogeneity in Public Clouds
Benjamin Farley, Venkatanathan Varadarajan, Kevin Bowers, Ari Juels, Thomas Ristenpart, and Michael Swift
Symposium on Cloud Computing - SOCC 2012

Cross-VM Side Channels and Their Use to Extract Private Keys
Yinqian Zhang, Ari Juels, Mike Reiter, and Thomas Ristenpart
Computer and Communications Security - CCS 2012
Received an ACM CCS Test-of-Time Award 2022

Resource-freeing Attacks: Improve Your Cloud Performance (at Your Neighbor's Expense)
Venkatanathan Varadarajan, Thawan Kooburat, Benjamin Farley, Thomas Ristenpart, and Michael Swift
Computer and Communications Security - CCS 2012

Multi-instance Security and its Application to Password-based Cryptography
Mihir Bellare, Thomas Ristenpart, and Stefano Tessaro
Advances in Cryptology - Crypto 2012

To Hash or Not to Hash Again? (In)differentiability Results for H^2 and HMAC
Yevgeniy Dodis, Thomas Ristenpart, John Steinberger, and Stefano Tessaro
Advances in Cryptology - Crypto 2012

Security Analysis of Smartphone Point-of-Sale Devices
WesLee Frisby, Benjamin Moench, Benjamin Recht, and Thomas Ristenpart
Workshop on Offensive Technologies - WOOT 2012

Peek-a-boo, I Still See You: Why Efficient Traffic Analysis Countermeasures Fail
Kevin Dyer, Scott Coull, Thomas Ristenpart, and Thomas Shrimpton
IEEE Symposium on Security and Privacy - Oakland 2012 [Systemization of Knowledge]

Randomness Condensers for Efficiently Samplable, Seed-Dependent Sources
Yevgeniy Dodis, Thomas Ristenpart, and Salil Vadhan
Theory of Cryptography Conference - TCC 2012

Tag Size Does Matter: Attacks and Proofs for the TLS Record Protocol
Kenneth G. Paterson, Thomas Ristenpart, and Thomas Shrimpton
Advances in Cryptology - Asiacrypt 2011

Got Traffic? An Evaluation of Click Traffic Providers
Qing Zhang, Thomas Ristenpart, Stefan Savage, and Geoffrey M. Voelker
Proceedings of the WICOM/AIRWeb Workshop on Web Quality - WebQuality 2011

Careful with Composition: Limitations of the Indifferentiability Framework
Thomas Ristenpart, Hovav Shacham, and Thomas Shrimpton
Advances in Cryptology - Eurocrypt 2011

Random Oracles with(out) Programmability
Marc Fischlin, Anja Lehmann, Thomas Ristenpart, Thomas Shrimpton, Martijn Stam, and Stefano Tessaro
Advances in Cryptology - Asiacrypt 2010

When Good Randomness Goes Bad: Virtual Machine Reset Vulnerabilities and Hedging Deployed Cryptography
Thomas Ristenpart and Scott Yilek
Network and Distributed Systems Security - NDSS 2010

Hedged Public-key Encryption: How to Protect against Bad Randomness
Mihir Bellare, Zvika Brakerski, Moni Naor, Thomas Ristenpart, Gil Segev, Hovav Shacham, and Scott Yilek
Advances in Cryptology - Asiacrypt 2009

Hey, You, Get Off of My Cloud: Exploring Information Leakage in Third-Party Compute Clouds
Thomas Ristenpart, Eran Tromer, Hovav Shacham, and Stefan Savage
Computer and Communications Security - CCS 2009
Received an ACM CCS Test-of-Time Award 2019

Format-Preserving Encryption
Mihir Bellare, Thomas Ristenpart, Phillip Rogaway, and Till Stegers
Selected Areas in Cryptography - SAC 2009

Simulation without the Artificial Abort: Simpler Proof and Improved Concrete Security for Waters' IBE Scheme
Mihir Bellare and Thomas Ristenpart
Advances in Cryptology - Eurocrypt 2009

Salvaging Merkle-Damgard for Practical Applications
Yevgeniy Dodis, Thomas Ristenpart, and Thomas Shrimpton
Advances in Cryptology - Eurocrypt 2009

Deterministic Encryption: Definitional Equivalences and Constructions without Random Oracles
Mihir Bellare, Marc Fischlin, Adam O'Neill, and Thomas Ristenpart
Advances in Cryptology - Crypto 2008

Privacy-preserving Location Tracking of Lost or Stolen Devices: Cryptographic Techniques and Replacing Trusted Third Parties with DHTs
Thomas Ristenpart, Gabriel Maganis, Arvind Krishnamurthy, and Tadayoshi Kohno
USENIX Security 2008

How to Build a Hash Function from any Collision-Resistant Function
Thomas Ristenpart and Thomas Shrimpton
Advances in Cryptology - Asiacrypt 2007

Hash Functions in the Dedicated-Key Setting: Design Choices and MPP Transforms
Mihir Bellare and Thomas Ristenpart
International Colloquim on Automata, Languages, and Programming - ICALP 2007

The Power of Proofs-of-Possession: Securing Multiparty Signatures against Rogue-Key Attacks
Thomas Ristenpart and Scott Yilek
Advances in Cryptology - Eurocrypt 2007

How to Enrich the Message Space of a Cipher
Thomas Ristenpart and Phillip Rogaway
Fast Software Encryption 2007 [Retracted February 2015]

Back to the Future: A Framework for Automatic Malware Removal
Francis Hsu, Hao Chen, Thomas Ristenpart, Jason Li, and Zhendong Su
In Proc. Annual Computer Security Applications Conference, ACSAC 2006

Multi-Property-Preserving Hash Domain Extension and the EMD Transform
Mihir Bellare and Thomas Ristenpart
Advances in Cryptology - Asiacrypt 2006, an earlier version appeared at the NIST Second Cryptographic Hash Workshop



Time Stamp Synchronization of Distributed Sensor Logs: Impossibility Results and Approximation Algorithms (pdf)
Thomas Ristenpart
UC Davis Masters thesis, September 2005

Insecurity of Tweak Chain Hashing
Thomas Ristenpart
Unpublished Manuscript, December 2003