Locally differentially private protocols for frequency estimation T Wang, J Blocki, N Li, S Jha 26th USENIX Security Symposium (USENIX Security 17), 729-745, 2017 | 572 | 2017 |
The johnson-lindenstrauss transform itself preserves differential privacy J Blocki, A Blum, A Datta, O Sheffet 2012 IEEE 53rd Annual Symposium on Foundations of Computer Science, 410-419, 2012 | 264 | 2012 |
Differentially private data analysis of social networks via restricted sensitivity J Blocki, A Blum, A Datta, O Sheffet Proceedings of the 4th conference on Innovations in Theoretical Computer …, 2013 | 246 | 2013 |
On the economics of offline password cracking J Blocki, B Harsha, S Zhou 2018 IEEE Symposium on Security and Privacy (SP), 853-871, 2018 | 103 | 2018 |
Efficiently computing data-independent memory-hard functions J Alwen, J Blocki Annual International Cryptology Conference, 241-271, 2016 | 80 | 2016 |
Differentially private password frequency lists J Blocki, A Datta, J Bonneau Cryptology ePrint Archive, 2016 | 72 | 2016 |
Depth-robust graphs and their cumulative memory complexity J Alwen, J Blocki, K Pietrzak Annual International Conference on the Theory and Applications of …, 2017 | 70 | 2017 |
Audit games J Blocki, N Christin, A Datta, AD Procaccia, A Sinha arXiv preprint arXiv:1303.0356, 2013 | 66 | 2013 |
Spaced repetition and mnemonics enable recall of multiple strong passwords J Blocki, S Komanduri, L Cranor, A Datta arXiv preprint arXiv:1410.1490, 2014 | 63 | 2014 |
Designing proof of human-work puzzles for cryptocurrency and beyond J Blocki, HS Zhou Theory of Cryptography: 14th International Conference, TCC 2016-B, Beijing …, 2016 | 55 | 2016 |
Practical graphs for optimal side-channel resistant memory-hard functions J Alwen, J Blocki, B Harsha Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017 | 54 | 2017 |
Understanding and protecting privacy: Formal semantics and principled audit mechanisms A Datta, J Blocki, N Christin, H DeYoung, D Garg, L Jia, D Kaynar, ... International Conference on Information Systems Security, 1-27, 2011 | 51 | 2011 |
Naturally rehearsing passwords J Blocki, M Blum, A Datta Advances in Cryptology-ASIACRYPT 2013: 19th International Conference on the …, 2013 | 49 | 2013 |
Optimizing password composition policies J Blocki, S Komanduri, A Procaccia, O Sheffet Proceedings of the fourteenth ACM conference on Electronic commerce, 105-122, 2013 | 46 | 2013 |
Sustained space complexity J Alwen, J Blocki, K Pietrzak Advances in Cryptology–EUROCRYPT 2018: 37th Annual International Conference …, 2018 | 45 | 2018 |
Towards practical attacks on argon2i and balloon hashing J Alwen, J Blocki 2017 IEEE European Symposium on Security and Privacy (EuroS&P), 142-157, 2017 | 44 | 2017 |
CASH: A cost asymmetric secure hash algorithm for optimal password protection J Blocki, A Datta 2016 IEEE 29th Computer Security Foundations Symposium (CSF), 371-386, 2016 | 38 | 2016 |
Audit games with multiple defender resources J Blocki, N Christin, A Datta, A Procaccia, A Sinha Proceedings of the AAAI Conference on Artificial Intelligence 29 (1), 2015 | 38 | 2015 |
Resolving the complexity of some data privacy problems J Blocki, R Williams Automata, Languages and Programming: 37th International Colloquium, ICALP …, 2010 | 38 | 2010 |
On the depth-robustness and cumulative pebbling cost of Argon2i J Blocki, S Zhou Theory of Cryptography: 15th International Conference, TCC 2017, Baltimore …, 2017 | 32 | 2017 |