Thomas Ristenpart
Publications


Cracking-resistant Password Vaults using Natural Language Encoders
Rahul Chatterjee, Joseph Bonneau, Ari Juels, and Thomas Ristenpart
IEEE Symposium on Security and Privacy - Oakland 2015

A Formal Treatment of Backdoored Pseudorandom Generators
Yevgeniy Dodis, Chaya Ganesh, Alexander Golovnev, Ari Juels and Thomas Ristenpart
Advances in Cryptology - Eurocrypt 2015

Cross-tenant Side-Channel Attacks in PaaS Clouds
Yinqian Zhang, Ari Juels, Michael Reiter, and Thomas Ristenpart
Computer and Communications Security - CCS 2014

Formatted Enryption Beyond Regular Languages
Daniel Luchaup, Thomas Shrimpton, Thomas Ristenpart, and Somesh Jha
Computer and Communications Security - CCS 2014

WhoWas: A Platform for Measuring Web Deployments on IaaS Clouds
Liang Wang, Antonio Nappa, Juan Caballero, Thomas Ristenpart, and Aditya Akella
Internet Measurement Conference - IMC 2014

Scheduler-based Defenses against Cross-VM Side-channels
Venkatanathan Varadarajan, Thomas Ristenpart, and Michael Swift
USENIX Security 2014

LibFTE: A Toolkit for Constructing Practical Format-Abiding Encryption Schemes
Daniel Luchaup, Kevin Dyer, Somesh Jha, Thomas Ristenpart, and Thomas Shrimpton
USENIX Security 2014

Privacy in Pharmacogenetics: An End-to-End Case Study of Personalized Warfarin Dosing
Matthew Fredrikson, Eric Lantz, Somesh Jha, Simon Lin, David Page, and Thomas Ristenpart
USENIX Security 2014
Received Best Paper Award

On the Practical Exploitability of Dual EC in TLS Implementations
Stephen Checkoway, Matt Fredrikson, Ruben Niederhagen, Adam Everspaugh, Matt Green, Tanja Lange, Thomas Ristenpart, Daniel J. Bernstein, Jake Maskiewicz, and Hovav Shacham
USENIX Security 2014

A Day Late and a Dollar Short: The Case for Research on Cloud Billing Systems
Robert Jellinek, Yan Zhai, Thomas Ristenpart, and Michael Swift
HotCloud 2014

Not-So-Random Numbers in Virtualized Linux and the Whirlwind RNG
Adam Everspaugh, Yan Zhai, Robert Jellinek, Thomas Ristenpart, and Michael Swift
IEEE Symposium on Security and Privacy - Oakland 2014

Honey Encryption: Security Beyond the Brute-force Barrier
Ari Juels and Thomas Ristenpart
Advances in Cryptology - Eurocrypt 2014

Protocol Misidentification Made Easy with Format-Transforming Encryption
Kevin Dyer, Scott Coull, Thomas Ristenpart, and Thomas Shrimpton
Computer and Communications Security - CCS 2013

Next Stop, the Cloud: Understanding Modern Web Service Deployment in EC2 and Azure
Keqiang He, Alexis Fisher, Liang Wang, Aaron Gembler, Aditya Akella, and Thomas Ristenpart
Internet Measurement Conference - IMC 2013

The Mix-and-Cut Shuffle: Small-domain Encryption Secure against N Queries
Thomas Ristenpart and Scott Yilek
Advances in Cryptology - Crypto 2013

DupLESS: Server-aided Encryption for Deduplicated Storage
Mihir Bellare, Sriram Keelveedhi, and Thomas Ristenpart
USENIX Security 2013

Fie on Firmware: Finding Vulnerabilities in Embedded Systems using Symbolic Execution
Drew Davidson, Benjamin Moench, Somesh Jha, and Thomas Ristenpart
USENIX Security 2013

Message-Locked Encryption and Secure Deduplication
Mihir Bellare, Sriram Keelveedhi, and Thomas Ristenpart
Advances in Cryptology - Eurocrypt 2013

More for Your Money: Exploiting Performance Heterogeneity in Public Clouds
Benjamin Farley, Venkatanathan Varadarajan, Kevin Bowers, Ari Juels, Thomas Ristenpart, and Michael Swift
Symposium on Cloud Computing - SOCC 2012

Cross-VM Side Channels and Their Use to Extract Private Keys
Yinqian Zhang, Ari Juels, Mike Reiter, and Thomas Ristenpart
Computer and Communications Security - CCS 2012

Resource-freeing Attacks: Improve Your Cloud Performance (at Your Neighbor's Expense)
Venkatanathan Varadarajan, Thawan Kooburat, Benjamin Farley, Thomas Ristenpart, and Michael Swift
Computer and Communications Security - CCS 2012

Multi-instance Security and its Application to Password-based Cryptography
Mihir Bellare, Thomas Ristenpart, and Stefano Tessaro
Advances in Cryptology - Crypto 2012

To Hash or Not to Hash Again? (In)differentiability Results for H^2 and HMAC
Yevgeniy Dodis, Thomas Ristenpart, John Steinberger, and Stefano Tessaro
Advances in Cryptology - Crypto 2012

Security Analysis of Smartphone Point-of-Sale Devices
WesLee Frisby, Benjamin Moench, Benjamin Recht, and Thomas Ristenpart
Workshop on Offensive Technologies - WOOT 2012

Peek-a-boo, I Still See You: Why Efficient Traffic Analysis Countermeasures Fail
Kevin Dyer, Scott Coull, Thomas Ristenpart, and Thomas Shrimpton
IEEE Symposium on Security and Privacy - Oakland 2012 [Systemization of Knowledge]

Randomness Condensers for Efficiently Samplable, Seed-Dependent Sources
Yevgeniy Dodis, Thomas Ristenpart, and Salil Vadhan
Theory of Cryptography Conference - TCC 2012

Tag Size Does Matter: Attacks and Proofs for the TLS Record Protocol
Kenneth G. Paterson, Thomas Ristenpart, and Thomas Shrimpton
Advances in Cryptology - Asiacrypt 2011

Got Traffic? An Evaluation of Click Traffic Providers
Qing Zhang, Thomas Ristenpart, Stefan Savage, and Geoffrey M. Voelker
Proceedings of the WICOM/AIRWeb Workshop on Web Quality - WebQuality 2011

Careful with Composition: Limitations of the Indifferentiability Framework
Thomas Ristenpart, Hovav Shacham, and Thomas Shrimpton
Advances in Cryptology - Eurocrypt 2011

Random Oracles with(out) Programmability
Marc Fischlin, Anja Lehmann, Thomas Ristenpart, Thomas Shrimpton, Martijn Stam, and Stefano Tessaro
Advances in Cryptology - Asiacrypt 2010

When Good Randomness Goes Bad: Virtual Machine Reset Vulnerabilities and Hedging Deployed Cryptography
Thomas Ristenpart and Scott Yilek
Network and Distributed Systems Security - NDSS 2010

Hedged Public-key Encryption: How to Protect against Bad Randomness
Mihir Bellare, Zvika Brakerski, Moni Naor, Thomas Ristenpart, Gil Segev, Hovav Shacham, and Scott Yilek
Advances in Cryptology - Asiacrypt 2009

Hey, You, Get Off of My Cloud: Exploring Information Leakage in Third-Party Compute Clouds
Thomas Ristenpart, Eran Tromer, Hovav Shacham, and Stefan Savage
Computer and Communications Security - CCS 2009

Format-Preserving Encryption
Mihir Bellare, Thomas Ristenpart, Phillip Rogaway, and Till Stegers
Selected Areas in Cryptography - SAC 2009

Simulation without the Artificial Abort: Simpler Proof and Improved Concrete Security for Waters' IBE Scheme
Mihir Bellare and Thomas Ristenpart
Advances in Cryptology - Eurocrypt 2009

Salvaging Merkle-Damgard for Practical Applications
Yevgeniy Dodis, Thomas Ristenpart, and Thomas Shrimpton
Advances in Cryptology - Eurocrypt 2009

Deterministic Encryption: Definitional Equivalences and Constructions without Random Oracles
Mihir Bellare, Marc Fischlin, Adam O'Neill, and Thomas Ristenpart
Advances in Cryptology - Crypto 2008

Privacy-preserving Location Tracking of Lost or Stolen Devices: Cryptographic Techniques and Replacing Trusted Third Parties with DHTs
Thomas Ristenpart, Gabriel Maganis, Arvind Krishnamurthy, and Tadayoshi Kohno
USENIX Security 2008

How to Build a Hash Function from any Collision-Resistant Function
Thomas Ristenpart and Thomas Shrimpton
Advances in Cryptology - Asiacrypt 2007

Hash Functions in the Dedicated-Key Setting: Design Choices and MPP Transforms
Mihir Bellare and Thomas Ristenpart
International Colloquim on Automata, Languages, and Programming - ICALP 2007

The Power of Proofs-of-Possession: Securing Multiparty Signatures against Rogue-Key Attacks
Thomas Ristenpart and Scott Yilek
Advances in Cryptology - Eurocrypt 2007

How to Enrich the Message Space of a Cipher
Thomas Ristenpart and Phillip Rogaway
Fast Software Encryption 2007 [Retracted February 2015]

Back to the Future: A Framework for Automatic Malware Removal
Francis Hsu, Hao Chen, Thomas Ristenpart, Jason Li, and Zhendong Su
In Proc. Annual Computer Security Applications Conference, ACSAC 2006

Multi-Property-Preserving Hash Domain Extension and the EMD Transform
Mihir Bellare and Thomas Ristenpart
Advances in Cryptology - Asiacrypt 2006, an earlier version appeared at the NIST Second Cryptographic Hash Workshop



Time Stamp Synchronization of Distributed Sensor Logs: Impossibility Results and Approximation Algorithms (pdf)
Thomas Ristenpart
UC Davis Masters thesis, September 2005

Insecurity of Tweak Chain Hashing
Thomas Ristenpart
Unpublished Manuscript, December 2003