Follow
Jeremiah Blocki
Title
Cited by
Cited by
Year
Locally differentially private protocols for frequency estimation
T Wang, J Blocki, N Li, S Jha
26th USENIX Security Symposium (USENIX Security 17), 729-745, 2017
5372017
The johnson-lindenstrauss transform itself preserves differential privacy
J Blocki, A Blum, A Datta, O Sheffet
2012 IEEE 53rd Annual Symposium on Foundations of Computer Science, 410-419, 2012
2562012
Differentially private data analysis of social networks via restricted sensitivity
J Blocki, A Blum, A Datta, O Sheffet
Proceedings of the 4th conference on Innovations in Theoretical Computer …, 2013
2372013
On the economics of offline password cracking
J Blocki, B Harsha, S Zhou
2018 IEEE Symposium on Security and Privacy (SP), 853-871, 2018
972018
Efficiently computing data-independent memory-hard functions
J Alwen, J Blocki
Annual International Cryptology Conference, 241-271, 2016
802016
Depth-robust graphs and their cumulative memory complexity
J Alwen, J Blocki, K Pietrzak
Annual International Conference on the Theory and Applications of …, 2017
682017
Differentially private password frequency lists
J Blocki, A Datta, J Bonneau
Cryptology ePrint Archive, 2016
682016
Audit games
J Blocki, N Christin, A Datta, AD Procaccia, A Sinha
arXiv preprint arXiv:1303.0356, 2013
652013
Spaced repetition and mnemonics enable recall of multiple strong passwords
J Blocki, S Komanduri, L Cranor, A Datta
arXiv preprint arXiv:1410.1490, 2014
622014
Practical graphs for optimal side-channel resistant memory-hard functions
J Alwen, J Blocki, B Harsha
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
532017
Designing proof of human-work puzzles for cryptocurrency and beyond
J Blocki, HS Zhou
Theory of Cryptography: 14th International Conference, TCC 2016-B, Beijing …, 2016
522016
Understanding and protecting privacy: Formal semantics and principled audit mechanisms
A Datta, J Blocki, N Christin, H DeYoung, D Garg, L Jia, D Kaynar, ...
International Conference on Information Systems Security, 1-27, 2011
502011
Naturally rehearsing passwords
J Blocki, M Blum, A Datta
Advances in Cryptology-ASIACRYPT 2013: 19th International Conference on the …, 2013
482013
Optimizing password composition policies
J Blocki, S Komanduri, A Procaccia, O Sheffet
Proceedings of the fourteenth ACM conference on Electronic commerce, 105-122, 2013
462013
Towards practical attacks on argon2i and balloon hashing
J Alwen, J Blocki
2017 IEEE European Symposium on Security and Privacy (EuroS&P), 142-157, 2017
452017
Sustained space complexity
J Alwen, J Blocki, K Pietrzak
Advances in Cryptology–EUROCRYPT 2018: 37th Annual International Conference …, 2018
432018
Audit games with multiple defender resources
J Blocki, N Christin, A Datta, A Procaccia, A Sinha
Proceedings of the AAAI Conference on Artificial Intelligence 29 (1), 2015
382015
Resolving the complexity of some data privacy problems
J Blocki, R Williams
Automata, Languages and Programming: 37th International Colloquium, ICALP …, 2010
382010
CASH: A cost asymmetric secure hash algorithm for optimal password protection
J Blocki, A Datta
2016 IEEE 29th Computer Security Foundations Symposium (CSF), 371-386, 2016
362016
On the depth-robustness and cumulative pebbling cost of Argon2i
J Blocki, S Zhou
Theory of Cryptography: 15th International Conference, TCC 2017, Baltimore …, 2017
312017
The system can't perform the operation now. Try again later.
Articles 1–20