Publications

Here’s a fairly complete list of my scientific papers. You can find bibliometrics on most of them in Google Scholar.

2024

[KLJ-LP+24] M. Kelkar, Y. Li, N. Jean-Louis, C. Ortega Peréz, K. Babel, A. Juels, and A. Miller. The Sting Framework: Proving the Existence of Superclass Adversaries. 2024. In submission.

[JK24] A. Juels and F. Koushanfar. Props for Machine-Learning Security. 2024. Manuscript.

[KBDA+24] M. Kelkar, K. Babel, P. Daian, J. Austgen, V. Buterin, and A. Juels. Complete Knowledge: Preventing Encumbrance of Cryptographic Secrets. ACM CCS, 2024. 

[MBKJ24] D. Maram, I. Bentov, M. Kelkar, and A. Juels. GoAT: File Geolocation via Anchor Timestamping. FC, 2024.

2023

[AFAB+23] J. Austgen, A. Fábrega, S. Allen, K. Babel, M. Kelkar, and A. Juels. DAO Decentralization: Voting-Bloc Entropy, Bribery, and Dark DAOs. 2023. In submission.

[TMHO+23]  J. Z. Tan, T. Merk, S. Hubbard, Eliza R. Oak, et al. Open Problems in DAOs. 2023. 

[BJKJ+23] K. Babel, M.Javaheripi, M. Kelkar, Y. Ji, F. Koushanfar, and A. Juels. Lanturn: Measuring Economic Security of Smart Contracts. Through Adaptive Learning. ACM CCS, 2023.

[KDLJ+23] M. Kelkar, S. Deb, S. Long, A. Juels, and S. Kannan.  Themis: Fast, Strong Order-Fairness in Byzantine Consensus. ACM CCS, 2023.  

[BDKJ23] K. Babel, P. Daian, M. Kelkar, and A. Juels. Clockwork Finance: Automated Analysis of Economic Security in Smart Contracts. IEEE S&P, 2023.

[KYAM+23] T. Kell, H. Yousaf, S. Allen, S. Meiklejohn, and A. Juels. Forsage: Anatomy of a Smart-Contract Pyramid Scheme. Financial Cryptography and Data Security, 2023. 

[TKFJ23] W. Tang, L. Kiffer, G. Fanti, and A. Juels. Strategic Latency Reduction in Blockchain Peer-to-Peer Networks. SIGMETRICS, 2023. 

2022

[AJKK+22] S. Allen, A. Juels, T. Kell, M. Khaire, S. Shrivastava. NFTs for Art and Collectables: Primer and Outlook. 2022. 

2021

[MMZJ-L+21] D. Maram, H. Malvai, F. Zhang, N. Jean-Louis, A. Frolov, T. Kell, T. Lobban, C. Moy, A. Juels, and A. Miller. CanDID: Can-Do Decentralized Identity with Legacy Compatibility, Sybil-Resistance, and Accountability. IEEE S&P, 2021. 

[HZJD+21] C. Hou, M. Zhou, Y. Ji, P. Daian, F. Tramer, G. Fanti, and A. Juels. SquirRL: Automating Attack Discovery on Blockchain Incentive Mechanisms with Deep Reinforcement Learning. NDSS 2021. 

2020

[ACEF+20] S. Allen, S. Capkun, I. Eyal, G. Fanti, B. Ford, J. Grimmelmann, A. Juels, K. Kostianinen, S. Meiklejohn, A. Miller, E. Prasad, K. Wüst, and F. Zhang. Design Choices for Central Bank Digital Currency: Policy and Technical Considerations. Brookings Institute Working Paper, 2020. 

[KZGJ20] M. Kelkar, F. Zhang, S. Goldfeder,  and A. Juels. Order-Fairness for Byzantine Consensus. CRYPTO, 2020. 

[MJPK-M+20] M. Mirkin, Y. Ji, J. Pang, A. Klages-Mundt, I. Eyal, and A. Juels. BDoS: Blockchain Denial of Service. ACM CCS, 2020.

[ZMMG+20] F. Zhang, S. K. D. Maram, H. Malvai, S. Goldfeder, and A. Juels. DECO: Liberating Web Data Using Decentralized Oracles for TLS. ACM CCS, 2020. Project website: deco.works.

[DGKL+20] P. Daian, S. Goldfeder, T. Kell, Y. Li, X. Zhao, I. Bentov, L. Breidenbach, and A. Juels. Flash Boys 2.0: Frontrunning, Transaction Reordering, and Consensus Instability in Decentralized Exchanges. IEEE S&P, 2020. Bloomberg article here.  (Crypto and Blockchains Economics Research (CBER) award, 2023)

2019

[JBCN+19] A. Juels, L. Breidenbach, A. Coventry, S. Nazarov, S. Ellis, and B. Magauran. Mixicles: Simple Private Decentralized Finance. 2019. (Work performed in my non-academic role as technical advisor to Chainlink.)

[JBCN+19] R. Chatterjee, M. S. Riazi, T. Chowdhury, E. Marasco, F. Koushanfar, and A. Juels. Multisketches: Practical Secure Sketches Using Off-the-Shelf Biometric Matching Algorithms. ACM CCS, 2019. 

[MZW+19] S.K.D. Maram, F. Zhang, L. Wang, A. Low, Y. Zhang, A. Juels, and D. Song. CHURP: Dynamic-Committee Proactive Secret Sharing. ACM CCS, 2019.

[CMJ+19] E. Cecchetti, B. Fisch, I. Miers, and A. Juels. PIEs: Public Incompressible Encodings for Decentralized Storage. ACM CCS, 2019. 

[BJZL+19] I. Bentov, Y. Ji, F. Zhang, Y. Li, X. Zhao, L. Breidenbach, P. Daian, and A. Juels. Tesseract: Real-Time Cryptocurrency Exchange using Trusted Hardware. ACM CCS, 2019. 

[ZDBJ19] F. Zhang, P. Daian, I. Bentov, and A. Juels. Paralysis Proofs: Safe Access-Structure Updates for Cryptocurrencies and More. Advances in Financial Technologies (AFT), pp. 1-15, 2019. Bitcoin Magazine article here.

[CZKH+19] R. Cheng, F. Zhang, J. Kos, W. He, N. Hynes, N. Johnson, A. Juels, A. Miller, and D. Song. Ekiden: A Platform for Confidentiality-Preserving, Trustworthy, and Performant Smart Contract Execution. Euro S&P, 2019. (Note: Used in Oasis Labs products.)

2018

[MSMJ+18] S. Matetic, M. Schneider, A. Miller, A, Juels, and S. Capkun. DelegaTEE: Brokered Delegation Using Trusted Execution Environments. USENIX Security, 2018.

[BDTJ18] L. Breidenbach, P. Daian, F. Tramer, and A. Juels. Enter the Hydra: Towards Principled Bug Bounties and Exploit-Resistant Smart Contracts. USENIX Security, 2018. Visit the Hydra Project website for code. Video presentation here.

2017

[CZJK+17] E. Cecchetti, F. Zhang, Y. Ji, A. Kosba, A. Juels, and E. Shi. Solidus: Confidential Distributed Ledger Transactions via PVORM. ACM CCS, 2017.

[MAKD+17] S. Matetic, M. Ahmed, K. Kostiainen, A. Dhar, D. Sommer, A. Gervais, A. Juels, and S. Capkun. ROTE: Rollback Protection for Trusted Execution. USENIX Security, 2017.

[ZEEJ+17] F. Zhang, I. Eyal, R. Escriva, A. Juels, and R. van Renesse. REM: Resource-Efficient Mining for Blockchains. USENIX Security, 2017.

[AACJ+17] J. Aikat, A. Akella, J. S. Chase, A. Juels, M. K. Reiter, T. Ristenpart, V. Sekar, M. M. Swift. Rethinking Security in the Era of Cloud Computing. IEEE Security & Privacy 15(3): 60-69 (2017).

[WCDJ+17] J. Woodage, R. Chatterjee, Y. Dodis, A. Juels, and T. Ristenpart. A New Distribution-Sensitive Secure Sketch and Popularity-Proportional Hashing. CRYPTO, pp. 682-710, 2017.

[AACJ+17] J. Aikat, A. Akella, J. S. Chase, A. Juels, M. K. Reiter, T. Ristenpart, V. Sekar, and M. Swift. Rethinking Security in the Era of Cloud Computing. IEEE Security & Privacy Magazine, 15(3): 60–69, 2017.

[TZLH+17] F. Tramèr, F. Zhang, H. Lin, J.-P. Hubaux, A. Juels, and E. Shi. Sealed-Glass Proofs: Using Transparent Enclaves to Prove and Sell Knowledge. In IEEE Euro S&P, pp. 19-34, 2017.

[TAGH+17] F. Tramèr, V. Atlidakis, R. Geambasu, D. Hsu, J.-P. Hubaux, M. Humbert, A. Juels, and H. Lin. FairTest: Discovering Unwarranted Associations in Data-Driven Applications. In IEEE Euro S&P, pp. 401-416, 2017.

[DEJS17] P. Daian, I. Eyal, A. Juels, and G. Sirer. PieceWork: Generalized Outsourcing Control for Proofs of Work. In BITCOIN Workshop, 2017.

2016

[ZCCJ+16] F. Zhang, E. Cecchetti, K. Croman, A. Juels, and E. Shi. Town Crier: An Authenticated Data Feed for Smart Contracts. ACM CCS, pp. 270-282, 2016. (Note: Licensed by Chainlink.) Slides here.

[JKS16] A. Juels, A. Kosba, and E. Shi. The Ring of Gyges: Investigating the Future of Criminal Smart Contracts. ACM CCS, pp. 283-295, 2016. (First version, “The Ring of Gyges: Using Smart Contracts for Crime,” was posted in 2015.)

[TZJR+16] F. Tramèr, F. Zhang, A. Juels, M. Reiter, and T. Ristenpart. Stealing Machine Learning Models via Prediction APIs. USENIX Security, pp. 601-618, 2016.

[MJ16] W. Marino and A. Juels. Setting Standards for Altering and Undoing Smart Contracts. Rule ML, pp. 151-166, 2016.

[HJ16] J.-P. Hubaux and A. Juels. Privacy is dead, long live privacy: Protecting social norms as confidentiality wanes. Communications of the ACM (CACM). 59(6): 39-41, June 2016.

[CAAJ+16] R. Chatterjee, A. Athayle, D. Akawhe, A. Juels, and T. Ristenpart. pASSWORD tYPOS and How to Correct Them Securely. IEEE Symposium on Security and Privacy (SP), pp. 800-816, 2016. (Distinguished Student Paper Award)

[CDEG+16] K. Croman, C. Decker, I. Eyal, A. E. Gencer, A. Juels, A. Kosba, A. Miller, P. Saxena, E. Shi, E. G. Sirer, D. Song, and R. Wattenhofer. On Scaling Decentralized Blockchains. BITCOIN, 2016.

[EJ16] D. Estrin and A. Juels. Reassembling Our Digital Selves. Daedalus, Journal of the American Academy of Arts & Sciences, 145(1): 43–53, Winter 2016.

2015

[ECSJ+15] A. Everspaugh, R. Chatterjee, S. Scott, A. Juels, and T. Ristenpart. The Pythia PRF Service. USENIX Security, pp. 547-562, 2015. 

[HAHF+15] Z. Huang, E. Ayday, J.-P. Hubaux, J. Fellay, and A. Juels. GenoGuard: Protecting Genomic Data against Brute-Force Attacks. IEEE Symposium on Security and Privacy (SP), pp. 447-462, 2015. (Distinguished Student Paper Award)

[CBJR15] R. Chatterjee, J. Bonneau, A. Juels, and T. Ristenpart. Cracking-Resistant Password Vaults using Natural Language Encoders. IEEE Symposium on Security and Privacy (SP), pp. 481-498, 2015.

[DGGJ+15] Y. Dodis, C. Ganesh, A. Golovnev, A. Juels and T. Ristenpart,
A Formal Treatment of Backdoored Pseudorandom Generators. EUROCRYPT, pp. 101-126, 2015. 

2014

[ZJRR14] Y. Zhang, A. Juels, M. Reiter, and T. Ristenpart. Cross-Tenant Side-Channel Attacks in PaaS Clouds. ACM CCS, pp. 990-1003, 2014.

[YHOR+14] T.-F. Yen, V. Heorhiadi, A. Oprea, M. K. Reiter, and A. Juels. An Epidemiological Study of Malware Encounters in a Large Enterprise. ACM CCS, pp. 1117-1130, 2014.

[BHJT14] K. Bowers, C. Hart, A. Juels, and N. Triandopoulos. PillarBox: Combating Next-Generation Malware with Fast Forward-Secure Logging. RAID, pp. 46-67, 2014. [Draft paper available here.]

[JR14b] A. Juels and T. Ristenpart. Honey Encryption: Encryption Beyond the Brute-Force Barrier. IEEE Security & Privacy Magazine, 12(4): 59-62, 2014.

[J14] A. Juels. A bodyguard of lies: the use of honey objects in information security. SACMAT, pp. 1-4, 2014.

[MJSP+14]  A. Miller, A. Juels, E. Shi, B. Parno, and J. Katz. PermaCoin: Repurposing Bitcoin Work for Long-Term Data Preservation. IEEE Symposium on Security and Privacy (SP), 2014. [Draft paper available here.]

[JR14a] A. Juels and T. Ristenpart. Honey Encryption: Security Beyond the Brute-Force Bound. EUROCRYPT, pp. 293-310, 2014.

[JW14] A. Juels and B. Wong. The Interplay of Neuroscience and Cryptography. Communications of the ACM (CACM), 56(2): 64-73, May 2014.

2013

[YOOL+13] T.-F. Yen, A. Oprea, K. Onarlioglu, T. Leetham, A. Juels, E. Kirda, and W. Robertson. Beehive: Large-Scale Log Analysis for Detecting Suspicious Activity in Enterprise Networks. Annual Computer Security Applications Conference (ACSAC), 2013.

[JR13] A. Juels and R. L. Rivest. Honeywords: Making Password-Cracking Detectable. ACM Computer and Communications Security (ACM CCS), pp. 145-160, 2013. (Note: See also the Honeywords Project Page.)

[RJK13] M. Rostami, A. Juels, and F. Koushanfar. Heart-to-Heart (H2H): Authentication for Implanted Medical Devices. ACM Computer and Communications Security (ACM CCS), pp. 1099-1112, 2013. (NYU-Poly Best Applied Security Paper Award, 2nd place.)

[vDJOR13] M. van Dijk, A. Juels, A. Oprea, and R. L. Rivest. FlipIt: The Game of “Stealthy Takeover”. Journal of Cryptology 26(4): 655-713, 2013.

[RBJK13] M. Rostami, W. Burleson, A. Juels, and F. Koushanfar. Balancing Security and Utility in Medical Devices. ACM Design Automation Conference (DAC), Article no. 13, 2013.

[BJRS13] K. Bowers, A. Juels, R. Rivest, and E. Shen. Drifting Keys: Impersonation Detection for Constrained Devices. IEEE INFOCOM, pp. 1025-1033, 2013.

[AO13] A. Juels and A. Oprea. New Approaches to Security and Availability for Cloud Data. Communications of the ACM (CACM) 56(2): 64-73, February 2013.

[ZCJ13] D. Zanetti, S. Capkun, and A. Juels. Tailing RFID Tags for Clone Detection. Networks and Distributed Security Systems (NDSS), 2013.

2012

[SvDOJ12] E. Stefanov, M. van Dijk, A. Oprea, and A. Juels. Iris: A Scalable Cloud File System with Efficient Integrity Checks. Annual Computer Security Applications Conference (ACSAC), pp. 229-238, 2012. (NYU-Poly/AT&T Best Applied Security Paper Award, 3rd place.)

[vDJOR+12] M. van Dijk, A. Juels, A. Oprea, R. L. Rivest, E. Stefanov, and N. Triandopoulos. Hourglass Schemes: How to Prove That Cloud Files Are Encrypted. ACM Computer and Communications Security (ACM CCS), pp. 265-280, 2012. [Slides]

[YJRR12] Y. Zhang, A. Juels, M. K. Reiter, and T. Ristenpart. Cross-VM Side Channels and Their Use to Extract Private Keys. ACM Computer and Communications Security (ACM CCS), pp. 305-316, 2012.

[FVBJ+12] B. Farley, V. Varajarajan, K.D. Bowers, A. Juels, T. Ristenpart, and M. M. Swift. More for Your Money: Exploiting Performance Heterogeneity in Public Clouds. Symposium on Cloud Computing (SoCC): 20, 2012.

[BvDGJ+12] K. D. Bowers, M. van Dijk, R. Griffin, A. Juels, A. Oprea, R. L. Rivest, and N. Triandopoulos. Defending against the Unknown Enemy: Applying FlipIt to System Security. GameSec, pp. 248-263, 2012.

[JY12] A. Juels and T.F. Yen. Sherlock Holmes and the Case of the Advanced Persistent Threat. USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET): 2, 2012.

2011

[BvDJO+11] K. Bowers, M. van Dijk, A. Juels, A. Oprea, and R. Rivest. How to Tell if Your Cloud Files Are Vulnerable to Drive Crashes. ACM Computer and Communications Security (ACM CCS), pp. 501-514, 2011.

[ZJOR11] Y. Zhang, A. Juels, A. Oprea, M. K. Reiter. Homealone: Co-Residency Detection in the Cloud via Side-Channel Analysis. IEEE Symposium on Security and Privacy (SP), pp. 313-328, 2011.

[DBvDJ11] T. Denning, K. D. Bowers, M. van Dijk, and A. Juels. Exploring Implicit Memory for Painless Password Recovery. International Conference on Human Factors in Computing Systems (CHI), pp. 2615-2618, 2011.

[JFP11] A. Juels, K. Fu, and C. Paar, Eds. 7th Workshop on RFID Security and Privacy (RFIDSec). Lec­tu­re Notes in Com­pu­ter Sci­ence 7055, Sprin­ger, Am­herst, MA, USA,  2011.

2010

[OJ10] A. Oprea and A. Juels. A Clean-Slate Look at Disk Scrubbing. USENIX Conference on File and Storage Technologies (FAST), pp. 57-70, 2010.

[J10b] A. Juels. Future tense: The Primal Cue. Communications of the ACM (CACM), 53(3): 120-ff,  2010.

[JCJ10] A. Juels, D. Catalano, and M. Jakobsson. Coercion-Resistant Electronic Elections. Towards Trustworthy Elections, pp. 37-63, 2010. (Workshop version appeared as [JCJ05].)

[J10a] A. Juels: The Physical Basis of RFID Security. RFIDSec. 2010. (Abstract of keynote talk.)

[JvD10] M. van Dijk and A. Juels. On the Impossibility of Cryptography Alone for Privacy-Preserving Cloud Computing. USENIX Workshop on Hot Topics in Security (HotSec), 2010.

2009

[BJO09a] K. D. Bowers, A. Juels, and A. Oprea. HAIL: A High-Availability and Integrity Layer for Cloud Storage.  ACM Conference on Computer and Communications Security (ACM CCS), pp. 187-198, 2009.

[KJKB09]  K. Koscher, A. Juels, T. Kohno, and V. Brajkovic. EPC RFID Tag Security Weaknesses and Defenses: Passport Cards, Enhanced Drivers Licenses, and Beyond.  ACM Conference on Computer and Communications Security (ACM CCS), pp. 187-198, 2009. (FAQ available here.)

[JW09] A. Juels and S. Weis. Defining Strong Privacy for RFID. ACM Transactions on Information and System Security (TISSEC): 13(1), 2009.

[J09] A. Juels: Power Games in RFID Security. IEEE International Conference for Internet Technology and Secured Transactions (ICITST), p. 1, 2009. (Abstract of keynote talk.) [Slides]

[SCRF+09] M. Salajegheh, S. S. Clark, B. Ransford, K. Fu, and A. Juels. CCCP: Secure Remote Storage for Computational RFIDs. USENIX Security Symposium, pp. 215-230, 2009.

[JJ09] M. Jakobsson and A. Juels. Server-Side Detection of Malware Infection. New Security Paradigms Workshop, pp. 11-22, 2009.

[BJO09b] K. Bowers, A. Juels, and A. Oprea. Proofs of Retrievability: Theory and Implementation.  ACM Cloud Computing Security Workshop (CCSW), pp. 43-54, 2009.

2008

[K08] T. Kohno. An Interview with RFID Security Expert Ari Juels. IEEE Pervasive Computing, 7(1):10-11, 2008.

[JPP08] A. Juels, B. Parno, and R. Pappu.  Unidirectional Key Distribution Across Time and Space with Applications to RFID Security. USENIX Security Symposium, pp. 75-90, 2008.

[JJR08] M. Jakobsson, A. Juels, and Jacob Ratkiewicz. Privacy-Preserving History Mining for Web Browsers. Web 2.0 Security and Privacy, 2008.

[J08] A. Juels. RFID security: in the shoulder and on the loading dock. ACM conference on Wireless network security (WiSec), p.1, 2008. (Abstract of keynote talk.) [Slides]

[TBJK+08] G. Tsudik, M. Burmester, A. Juels, A. Kobsa, D. Molnar, R. Di Pietro, M. R. Rieback. RFID security and privacy: long-term research or short-term tinkering? ACM conference on Wireless network security (WiSec), p.160, 2008. (Abstract of panel.)

2007

[J07] A. Juels. The Vision of Secure RFID. Proceedings of the IEEE, 95(8): 1507-8, Aug. 2007.

[CEJM+07] S. G. Choi, A. Elbaz, A. Juels, T. Malkin, and M. Yung. Two-Party Computing with Encrypted Data. Advances in Cryptology–ASIACRYPT, pp. 298-314, 2007.

[JK07] A. Juels and B. Kaliski. PORs: Proofs of Retrievability for Large Files. ACM Conference on Computer and Communications Security (ACM CCS), pp. 584–597, 2007.

[BBGJ07] D. Bailey, D. Boneh, E.-J. Goh, and A. Juels. Covert Channels in Privacy-Preserving Identification Systems. ACM Conference on Computer and Communications Security (ACM CCS), pp. 297-306, 2007.

[JW07] A. Juels and S. Weis. Defining Strong Privacy for RFID (Extended abstract). PerCom Workshops (PerTec), pp. 342-347, 2007.

[JSJ07] A. Juels, S. Stamm, and M. Jakobsson. Combatting Click Fraud via Premium Clicks. USENIX Security Symposium, pp. 17–26, 2007.

[HBFJ+07] T. S. Heydt-Benjamin, D. V. Bailey, K. Fu, A. Juels, and T. O’Hare. Vulnerabilities in First-Generation RFID-Enabled Credit Cards. Financial Cryptography and Data Security, pp. 2-14, 2007.

[BFJ07] B. Defend, K. Fu, and A. Juels. Cryptanalysis of Two Lightweight RFID Authentication Schemes. Percom Workshops (PerSec), pp. 211-216, 2007.

2006

[BJ06] D. Bailey and A. Juels. Shoehorning Security into the EPC Standard. Security and Cryptography for Networks (SCN), pp. 303-320, 2006.

[HJSW06] J. Halamka, A. Juels, A. Stubblefield, and J. Westhues. The Security Implications of VeriChip Cloning. Journal of the American Medical Informatics Association (JAMIA) 13(6): 601-607, 2006.

[BJRS+06] J. Brainard, A. Juels, R. Rivest, M. Szydlo, and M. Yung. Fourth Factor Authentication: Somebody You Know. ACM Conference on Computer and Communications Security (ACM CCS), pp. 168-178, 2006. (Note: See the Facebook’s Trusted Contacts system.)

[JJJ06] A. Juels, M. Jakobsson, and T. Jagatic. Cache Cookies for Browser Authentication (Extended Abstract). IEEE Symposium on Security and Privacy (SP), pp. 301-305, 2006.

[J06a] A. Juels.  RFID security and privacy: a research survey. Journal of Selected Areas in Communication (J-SAC) 24(2): 381-394, 2006. (IEEE Best Tutorial Paper Award, 2007.)

[JS06] A. Juels and M. Sudan. A Fuzzy Vault Scheme. Designs, Codes, and Cryptography 38(2): 237-257, 2006.

[J06b] A. Juels: The Outer Limits of RFID Security. Cryptographic Hardware and Embedded Systems (CHES), p. 231, 2006. (Abstract of invited talk.)

2005

[JSB05] A. Juels, P. Syverson, and D. Bailey. High-Power Proxies for Enhancing RFID Privacy and Utility. Privacy Enhancing Technologies (PET), pp. 210-226, 2005.

[BGSJ+05] S.C. Bono, M. Green, A. Stubblefield, A. Juels, A. D. Rubin, and M. Syzdlo.  Security Analysis of a Cryptographically-Enabled RFID Device. USENIX Security Symposium, pp. 1-16, 2005. (Best Student Paper Award, USENIX Security and  Outstanding Research Award in Privacy Enhancing Technologies, 2007.)

[J05a] A. Juels. RFID Privacy: A Technical Primer for the Non-Technical Reader. In K. Strandburg, ed., Privacy and Identity: The Promise and Perils of a Technological Age. Springer. 2005.

[J05b] A. Juels. Attack on a Cryptographic RFID Device. Guest column in RFID Journal. 28 Feb. 2005.

[J05c] A. Juels. A Bit of Privacy. Guest column in RFID Journal. 2 May 2005.

[JMW05] A. Juels, D. Molnar, and D. Wagner. Security Issues in E-Passports. SecureComm, pp.74-88, 2005.

[JW05] A. Juels and S. Weis. Authenticating Pervasive Devices with Human Protocols. Advances in Cryptology–CRYPTO, pp. 293-308, 2005.

[JCJ05] A. Juels, D. Catalano, and M. Jakobsson. Coercion-Resistant Electronic Voting. Workshop on Privacy in the Electronic Society (WPES), pp. 61-70, 2005.

[JRG05] A. Juels, R. Pappu, and S. Garfinkel. RFID Privacy: An Overview of Problems and Proposed Solutions. IEEE Security and Privacy, 3(3): 34-43. May/June 2005.

[JSB05] A. Juels, P. Syverson, and D. Bailey. High-Power Proxies for Enhancing RFID Privacy and Utility. Privacy Enhancing Technologies (PET), pp. 210-226, 2005.

[J05d] A. Juels. Strengthening EPC Tags Against Cloning. Workshop on Wireless Security (WiSec), pp. 67-76, 2005.

[JCJ05] A. Juels, D. Catalano, and M. Jakobsson. Coercion-Resistant Electronic Elections. Workshop on Privacy in the Electronic Society (WPES), pp. 61-70, 2005. (Journal version appeared as [JCJ10].)

2004

[J04a] A. Juels, ed., Financial Cryptography, 8th International Conference, Revised Papers. Springer-Verlag. LNCS no. 3110. 2004.

[GJ04a] P. Golle and A. Juels. Parallel Mixing. ACM Conference on Computer and Communications Security (ACM CCS), pp. 220-226, 2004.

[GJ04b] P. Golle and A. Juels. Dining Cryptographers Revisited. Advances in Cryptology–EUROCRYPT, pp. 456-473, 2004.

[WJHF04] B. Waters, A. Juels, A. Halderman, and E. Felten. New Client Puzzle Outsourcing Techniques for DoS Resistance. ACM Conference on Computer and Communications Security (ACM CCS), pp. 246-256, 2004.

[JB04] A. Juels and J. Brainard. Soft Blocking: Flexible Blocker Tags on the Cheap. Workshop on Privacy in the Electronic Society (WPES), pp.1-7, 2004.

[J04b] A. Juels. Minimalist Cryptography for RFID Tags. Security in Communication Networks (SCN), pp. 149-164, 2004.

[J04c] A. Juels. “Yoking-Proofs” for RFID Tags. IEEE Annual Conference on Pervasive Computing and Communications Workshops (PERCOMW), pp.138—143, 2004.

[J04d] A. Juels. RFID: security and privacy for five-cent wireless devices. Workshop on Wireless Security (WiSec), p. 31, 2004. (Abstract of keynote talk.)

[J04e] A. Juels. RFID: Security and Privacy for Five-Cent Computers. USENIX Security Symposium. (Abstract of invited talk.) [Slides

[GJJS04] P. Golle, M. Jakobsson, A. Juels, and P. Syverson. Universal Re-Encryption for Mixnets. RSA Conference Cryptographers’ Track (CT-RSA), pp. 163-178, 2004.

[JS04] A. Juels and M. Szydlo. Attribute-Based Encryption: Using Identity-Based Encryption for Access Control.  Manuscrupt. 17 June 2004. (Note: Introduced the term and concept of ABE, with an early construction.)

2003

[JRS03] A. Juels, R. L. Rivest, and M. Szydlo. The Blocker Tag: Selective Blocking of RFID Tags for Consumer Privacy (full version). ACM Conference on Computer and Communications Security (ACM CCS), pp. 103-111, 2003. [Slides]

[BJKS03] J. Brainard, A. Juels, B. Kaliski, and M. Szydlo. A New Two-Server Approach for Authentication with Short Secrets. USENIX Security Symposium, pp. 201–214, 2003. (Realized years later as the RSA Distributed Credential Protection product.)

[JP03] A. Juels and R. Pappu. Squealing Euros: Privacy-Protection in RFID-Enabled Banknotes. Financial Cryptography, pp. 103-121, 2003. [Slides]

2002

[JS02] A. Juels and M. Sudan. A Fuzzy Vault Scheme [full version]. International Symposium on Information Theory (ISIT), p. 408, 2002.

[JJR02] M. Jakobsson, A. Juels, and R. Rivest. Making Mix Nets Robust for Electronic Voting by Randomized Partial Checking. USENIX Security Symposium, pp. 339-353, 2002.

[JS02b] A. Juels and M. Szydlo. A Two-Server Sealed-Bid Auction Protocol. Financial Cryptography, pp. 72-86, 2002. [Slides]

[JJN02] M. Jakobsson, A. Juels, and P. Nguyen. Proprietary Certificates. RSA Conference Cryptographers’ Track (CT-RSA), pp. 164-181, 2002.

[GZBJ+02] P. Golle, S. Zhong, D. Boneh, M. Jakobsson, and A. Juels. Optimistic Mixing for Exit-Polls. Advances in Cryptology – ASIACRYPT, pp. 451-465, 2007.

[JG02] A. Juels and J. Guajardo. RSA Key Generation with Verifiable Randomness. Public Key Cryptography (PKC), pp. 357-374, 2002.

[FJJ02] N. Frykholm, A. Juels, and M. Jakobsson, Jeu de Paume: A Security Suite for Handheld Devices. Manuscript, 2002. [Slides]

2001

[FJ01] N. Frykholm and A. Juels. An Error-Tolerant Password Recovery Scheme. ACM Conference on Computer and Communications Security (ACM CCS), pp. 1-9, 2001. [Slides]

[JJ01] A. Juels and M. Jakobsson. An Optimally Robust Hybrid Mix Network. Principles of Distributed Computing (PODC), pp. 284-292, 2001.

[J01] A. Juels. Targeted Advertising… And Privacy Too. RSA Conference Cryptographers’ Track (CT-RSA), pp. 408-424, 2001. [Slides]

2000

[JJ00a] M. Jakobsson and A. Juels. Mix and Match: Secure Function Evaluation via Ciphertexts. Advances in Cryptology–ASIACRYPT, pp. 346-358, 2000. [Slides]

[JJ00b] M. Jakobsson and A. Juels. Addition of ElGamal Plaintexts.  Advances in Cryptology–ASIACRYPT, pp. 346-358, 2000.

[HJJY00] J. Håstad, J. Jonsson, A. Juels, and M. Yung. Funkspiel Schemes: An Alternative to Conventional Tamper Resistance.  ACM Conference on Computer and Communications Security (ACM CCS), pp. 125-133, 2000. [Slides] (Note: Inspired by the story of Hubertus Lauwers.)

[JP00] A. Juels and M. Peinado. Hiding Cliques for Cryptographic Security. Designs, Codes, and Cryptography 20(3): 269-280, 2000. (Conference version in Symposium on Discrete Algorithms (SODA), pp. 678-684, 1998.)

[JJSH00] A. Juels, M. Jakobsson, E. Shriver, and B. Hillyer. How to Turn Loaded Dice into Fair Coins.  IEEE Transactions on Information Theory 46(3): 911-921, 2000.

1999

[JW99] A. Juels and M. Wattenberg. A Fuzzy Commitment Scheme. ACM Conference on Computer and Communications Security (ACM CCS), pp. 28-36, 1999. [Slides]

[JJ99a] M. Jakobsson and A. Juels. Proofs of Work and Bread Pudding Protocols. Communications and Multimedia Security (CMS), pp. 258-272, 1999. [Slides]

[JB99] A. Juels and J. Brainard. Client Puzzles: A Cryptographic Defense Against Connection Depletion Attacks. Networks and Distributed Security Systems (NDSS), pp. 151-165, 1999. [Slides] Used today, for example, in Akamai’s “challenge action” bot mitigation.

[J99] A. Juels. Trustee Tokens: Simple and Practical Tracing of Anonymous Digital Cash. Financial Cryptography, pp. 29-45, 1999. [Slides]

[JJ99b] M. Jakobsson and A. Juels. Millimix: Mixing in Small Batches. Manuscript, 1999. (Published as DIMACS TR 99 – 33.)

1998 and earlier

[JSHJ98] M. Jakobsson, L. Shriver, B. Hillyer, and A. Juels. A Practical Secure Physical Random Bit Generator. ACM Conference on Computer and Communications Security (ACM CCS), pp. 103-111, 1998.

[JJ98] M. Jakobsson and A. Juels. X-Cash: Executable Digital Cash. Financial Cryptography, pp. 16-27, 1998. [Slides] (This paper was the first to introduce the idea of scripts in digital currency, an idea expressed in, e.g., Bitcoin Script.)

[J98] A. Juels. The Equilibrium Genetic Algorithm (EGA). Manuscript, 1998. (Note: Unpublished material from my PhD dissertation and earlier graduate work.)

[JLO97] A. Juels, M. Luby, and R. Ostrovsky. Security of Blind Digital Signatures (Extended Abstract). Advances in Cryptology–CRYPTO, pp. 150-164, 1997.

[J96] A. Juels. Topics in Black-Box Combinatorial Optimization. U.C. Berkeley Ph.D. Dissertation. 1996.

[JW95] A. Juels and M. Wattenberg. Stochastic hillclimbing as a Baseline Method for Evaluating Genetic Algorithms. Advances in Neural Information Processing Systems (NIPS), pp. 430-436, 1995.