Ari Juels
Ari Juels
Professor, Computer Science, Cornell Tech (Jacobs); Co-Director, IC3
Verified email at - Homepage
Cited by
Cited by
PORs: Proofs of retrievability for large files
A Juels, BS Kaliski Jr
Proceedings of the 14th ACM conference on Computer and communications …, 2007
RFID security and privacy: A research survey
A Juels
IEEE journal on selected areas in communications 24 (2), 381-394, 2006
A fuzzy commitment scheme
A Juels, M Wattenberg
Proceedings of the 6th ACM conference on Computer and communications …, 1999
A fuzzy vault scheme
A Juels, M Sudan
Designs, Codes and Cryptography 38, 237-257, 2006
Stealing machine learning models via prediction {APIs}
F Tramèr, F Zhang, A Juels, MK Reiter, T Ristenpart
25th USENIX security symposium (USENIX Security 16), 601-618, 2016
On Scaling Decentralized Blockchains: (A Position Paper)
K Croman, C Decker, I Eyal, AE Gencer, A Juels, A Kosba, A Miller, ...
International conference on financial cryptography and data security, 106-125, 2016
HAIL: A high-availability and integrity layer for cloud storage
KD Bowers, A Juels, A Oprea
Proceedings of the 16th ACM conference on Computer and communications …, 2009
The blocker tag: selective blocking of RFID tags for consumer privacy
A Juels, RL Rivest, M Szydlo
Proceedings of the 10th ACM conference on Computer and communications …, 2003
Cross-VM side channels and their use to extract private keys
Y Zhang, A Juels, MK Reiter, T Ristenpart
Proceedings of the 2012 ACM conference on Computer and communications …, 2012
Authenticating pervasive devices with human protocols
A Juels, SA Weis
Advances in Cryptology–CRYPTO 2005: 25th Annual International Cryptology …, 2005
Client puzzles: A cryptographic countermeasure against connection depletion attacks
A Juels
Proc. Networks and Distributed System Security Symposium (NDSS), 1999, 1999
Coercion-resistant electronic elections
A Juels, D Catalano, M Jakobsson
Proceedings of the 2005 ACM Workshop on Privacy in the Electronic Society, 61-70, 2005
Proofs of retrievability: Theory and implementation
KD Bowers, A Juels, A Oprea
Proceedings of the 2009 ACM workshop on Cloud computing security, 43-54, 2009
Proofs of work and bread pudding protocols
M Jakobsson, A Juels
Communications and Multimedia Security, 258-272, 1999
Town crier: An authenticated data feed for smart contracts
F Zhang, E Cecchetti, K Croman, A Juels, E Shi
Proceedings of the 2016 aCM sIGSAC conference on computer and communications …, 2016
RFID privacy: An overview of problems and proposed solutions
SL Garfinkel, A Juels, R Pappu
IEEE Security & Privacy 3 (3), 34-43, 2005
Minimalist cryptography for low-cost RFID tags
A Juels
Security in Communication Networks: 4th International Conference, SCN 2004 …, 2005
Flash boys 2.0: Frontrunning in decentralized exchanges, miner extractable value, and consensus instability
P Daian, S Goldfeder, T Kell, Y Li, X Zhao, I Bentov, L Breidenbach, ...
2020 IEEE symposium on security and privacy (SP), 910-927, 2020
Universal re-encryption for mixnets
P Golle, M Jakobsson, A Juels, P Syverson
Topics in Cryptology–CT-RSA 2004: The Cryptographers’ Track at the RSA …, 2004
Squealing Euros: Privacy Protection in RFID-Enabled Banknotes
A Juels, R Pappu
Financial Cryptography, Lecture Notes in Computer Science 2742, 103-121, 2004
The system can't perform the operation now. Try again later.
Articles 1–20