Ari Juels
#119,766
Most Influential Person Now
Ari Juels's AcademicInfluence.com Rankings
Ari Juelscomputer-science Degrees
Computer Science
#4783
World Rank
#5048
Historical Rank
Database
#1976
World Rank
#2074
Historical Rank

Download Badge
Computer Science
Ari Juels's Degrees
- Masters Computer Science Stanford University
- Bachelors Computer Science Stanford University
Similar Degrees You Can Earn
Why Is Ari Juels Influential?
(Suggest an Edit or Addition)Ari Juels's Published Works
Number of citations in a given year to any of this author's works
Total number of citations to an author for the works they published in a given year. This highlights publication of the most important work(s) by the author
Published Works
- Pors: proofs of retrievability for large files (2007) (2331)
- RFID security and privacy: a research survey (2006) (2047)
- A fuzzy commitment scheme (1999) (1631)
- A Fuzzy Vault Scheme (2002) (1568)
- Stealing Machine Learning Models via Prediction APIs (2016) (1248)
- HAIL: a high-availability and integrity layer for cloud storage (2009) (1143)
- The blocker tag: selective blocking of RFID tags for consumer privacy (2003) (964)
- Cross-VM side channels and their use to extract private keys (2012) (821)
- Authenticating Pervasive Devices with Human Protocols (2005) (798)
- Proofs of retrievability: theory and implementation (2009) (656)
- Coercion-resistant electronic elections (2005) (630)
- Client Puzzles: A Cryptographic Countermeasure Against Connection Depletion Attacks (1999) (592)
- RFID privacy: an overview of problems and proposed solutions (2005) (548)
- Minimalist Cryptography for Low-Cost RFID Tags (2004) (502)
- Town Crier: An Authenticated Data Feed for Smart Contracts (2016) (500)
- Defining Strong Privacy for RFID (2007) (481)
- On Scaling Decentralized Blockchains - (A Position Paper) (2016) (478)
- Making Mix Nets Robust for Electronic Voting by Randomized Partial Checking (2002) (453)
- Universal Re-encryption for Mixnets (2004) (450)
- Squealing Euros: Privacy Protection in RFID-Enabled Banknotes (2003) (417)
- Proofs of Work and Bread Pudding Protocols (1999) (409)
- Security and Privacy Issues in E-passports (2005) (372)
- HomeAlone: Co-residency Detection in the Cloud via Side-Channel Analysis (2011) (353)
- Cross-Tenant Side-Channel Attacks in PaaS Clouds (2014) (352)
- Security Analysis of a Cryptographically-Enabled RFID Device (2005) (324)
- "Yoking-proofs" for RFID tags (2004) (307)
- Mix and Match: Secure Function Evaluation via Ciphertexts (2000) (304)
- On the Impossibility of Cryptography Alone for Privacy-Preserving Cloud Computing (2010) (292)
- Permacoin: Repurposing Bitcoin Work for Data Preservation (2014) (289)
- Fourth-factor authentication: somebody you know (2006) (282)
- Honeywords: making password-cracking detectable (2013) (263)
- Ekiden: A Platform for Confidentiality-Preserving, Trustworthy, and Performant Smart Contracts (2018) (250)
- Strengthening EPC tags against cloning (2005) (249)
- Beehive: large-scale log analysis for detecting suspicious activity in enterprise networks (2013) (246)
- FlipIt: The Game of “Stealthy Takeover” (2012) (232)
- Heart-to-heart (H2H): authentication for implanted medical devices (2013) (203)
- Iris: a scalable cloud file system with efficient integrity checks (2012) (193)
- New client puzzle outsourcing techniques for DoS resistance (2004) (192)
- Security of blind digital signatures (1997) (190)
- Dining Cryptographers Revisited (2004) (180)
- More for your money: exploiting performance heterogeneity in public clouds (2012) (178)
- The Ring of Gyges: Investigating the Future of Criminal Smart Contracts (2016) (173)
- Flash Boys 2.0: Frontrunning, Transaction Reordering, and Consensus Instability in Decentralized Exchanges (2019) (167)
- ROTE: Rollback Protection for Trusted Execution (2017) (166)
- Flash Boys 2.0: Frontrunning in Decentralized Exchanges, Miner Extractable Value, and Consensus Instability (2020) (163)
- PROOFS OF WORK AND BREAD PUDDING PROTOCOLS (EXTENDED ABSTRACT) (1999) (159)
- New approaches to security and availability for cloud data (2013) (157)
- Security of Blind Digital Signatures (Extended Abstract) (1997) (156)
- Client puzzles: A cryptographic defense against connection depletion (1999) (145)
- High-Power Proxies for Enhancing RFID Privacy and Utility (2005) (141)
- Vulnerabilities in First-Generation RFID-Enabled Credit Cards (2007) (141)
- FairTest: Discovering Unwarranted Associations in Data-Driven Applications (2015) (140)
- Optimistic Mixing for Exit-Polls (2002) (132)
- Soft blocking: flexible blocker tags on the cheap (2004) (126)
- Tesseract: Real-Time Cryptocurrency Exchange Using Trusted Hardware (2019) (121)
- Honey Encryption: Security Beyond the Brute-Force Bound (2014) (118)
- Hiding Cliques for Cryptographic Security (1998) (113)
- REM: Resource-Efficient Mining for Blockchains (2017) (112)
- A New Two-Server Approach for Authentication with Short Secrets (2003) (105)
- Targeted Advertising ... And Privacy Too (2001) (104)
- Stochastic Hillclimbing as a Baseline Mathod for Evaluating Genetic Algorithms (1995) (99)
- How to tell if your cloud files are vulnerable to drive crashes (2011) (99)
- A Two-Server, Sealed-Bid Auction Protocol (2002) (98)
- An optimally robust hybrid mix network (2001) (98)
- Ekiden: A Platform for Confidentiality-Preserving, Trustworthy, and Performant Smart Contract Execution (2018) (94)
- Solidus: Confidential Distributed Ledger Transactions via PVORM (2017) (90)
- Error-tolerant password recovery (2001) (87)
- Hourglass schemes: how to prove that cloud files are encrypted (2012) (86)
- Sealed-Glass Proofs: Using Transparent Enclaves to Prove and Sell Knowledge (2017) (86)
- Order-Fairness for Byzantine Consensus (2020) (83)
- Enter the Hydra: Towards Principled Bug Bounties and Exploit-Resistant Smart Contracts (2018) (82)
- Unidirectional Key Distribution Across Time and Space with Applications to RFID Security (2008) (82)
- Setting Standards for Altering and Undoing Smart Contracts (2016) (81)
- Design Choices for Central Bank Digital Currency: Policy and Technical Considerations (2020) (81)
- EPC RFID tag security weaknesses and defenses: passport cards, enhanced drivers licenses, and beyond (2009) (75)
- GenoGuard: Protecting Genomic Data against Brute-Force Attacks (2015) (74)
- Cracking-Resistant Password Vaults Using Natural Language Encoders (2015) (73)
- Balancing security and utility in Medical Devices? (2013) (73)
- The Pythia PRF Service (2015) (70)
- A Formal Treatment of Backdoored Pseudorandom Generators (2015) (69)
- How to turn loaded dice into fair coins (2000) (68)
- An Epidemiological Study of Malware Encounters in a Large Enterprise (2014) (66)
- Cache cookies for browser authentication (2006) (63)
- Defending against the Unknown Enemy: Applying FlipIt to System Security (2012) (60)
- Honey Encryption: Encryption beyond the Brute-Force Barrier (2014) (57)
- DECO: Liberating Web Data Using Decentralized Oracles for TLS (2019) (56)
- Exploring implicit memory for painless password recovery (2011) (55)
- Stochastic Hillclimbing as a Baseline Method for (1994) (55)
- Combating Click Fraud via Premium Clicks (2007) (54)
- Parallel mixing (2004) (54)
- pASSWORD tYPOS and How to Correct Them Securely (2016) (51)
- The Security Implications of VeriChip Cloning (2006) (51)
- Cryptanalysis of Two Lightweight RFID Authentication Schemes (2007) (48)
- Technology Evaluation: The Security Implications of VeriChip Cloning (2006) (47)
- A practical secure physical random bit generator (1998) (47)
- CHURP: Dynamic-Committee Proactive Secret Sharing (2019) (46)
- BDoS: Blockchain Denial-of-Service (2019) (45)
- A Clean-Slate Look at Disk Scrubbing (2010) (43)
- Rethinking Security in the Era of Cloud Computing (2017) (42)
- Shoehorning Security into the EPC Tag Standard (2006) (40)
- Tailing RFID Tags for Clone Detection (2013) (39)
- CanDID: Can-Do Decentralized Identity with Legacy Compatibility, Sybil-Resistance, and Accountability (2021) (38)
- EPC RFID Tags in Security Applications: Passport Cards, Enhanced Drivers Licenses, and Beyond (2008) (36)
- RSA Key Generation with Verifiable Randomness (2002) (35)
- Proceedings of the 13th ACM conference on Computer and communications security (2005) (35)
- SquirRL: Automating Attack Discovery on Blockchain Incentive Mechanisms with Deep Reinforcement Learning (2019) (34)
- RFID. Security and Privacy (2011) (34)
- CCCP: Secure Remote Storage for Computational RFIDs (2009) (34)
- Discovering Unwarranted Associations in Data-Driven Applications with the FairTest Testing Toolkit (2015) (30)
- PillarBox: Combating Next-Generation Malware with Fast Forward-Secure Logging (2014) (29)
- Trustee Tokens: Simple and Practical Anonymous Digital Coin Tracing (1999) (28)
- SquirRL: Automating Attack Analysis on Blockchain Incentive Mechanisms with Deep Reinforcement Learning (2021) (28)
- RFID: security and privacy for five-cent wireless devices (abstract only) (2004) (27)
- Themis: Fast, Strong Order-Fairness in Byzantine Consensus (2021) (26)
- Sherlock Holmes and the Case of the Advanced Persistent Threat (2012) (25)
- Server-side detection of malware infection (2009) (25)
- (Short Paper) PieceWork: Generalized Outsourcing Control for Proofs of Work (2017) (25)
- Shoehorning Security into the EPC Standard (2006) (24)
- A New Distribution-Sensitive Secure Sketch and Popularity-Proportional Hashing (2017) (24)
- The Ring of Gyges : Using Smart Contracts for Crime (2015) (23)
- Two-Party Computing with Encrypted Data (2007) (22)
- A bodyguard of lies: the use of honey objects in information security (2014) (21)
- DelegaTEE: Brokered Delegation Using Trusted Execution Environments (2018) (21)
- RFID PRIVACY : A TECHNICAL PRIMER FOR THE NON-TECHNICAL READER (2005) (21)
- Topics in black-box combinatorial optimization (1996) (21)
- Funkspiel schemes: an alternative to conventional tamper resistance (2000) (20)
- Covert channels in privacy-preserving identification systems (2007) (17)
- Proprietary Certificates (2002) (14)
- The Equilibrium Genetic Algorithm and the Role of Crossover (1993) (14)
- PIEs: Public Incompressible Encodings for Decentralized Storage (2019) (14)
- X-Cash: Executable Digital Cash (1998) (14)
- Mix and Match: Secure Function Evaluation via Ciphertexts (Extended Abstract) (2000) (13)
- Clockwork Finance: Automated Analysis of Economic Security in Smart Contracts (2021) (13)
- Privacy is dead, long live privacy (2016) (12)
- Addition of ElGamal Plaintexts (2000) (12)
- Proceedings of the 5th ACM workshop on Privacy in electronic society (2006) (11)
- Active Cookies for Browser Authentication (2007) (10)
- Paralysis Proofs: Safe Access-Structure Updates for Cryptocurrencies and More (2018) (10)
- The Vision of Secure RFID (2007) (9)
- Multisketches: Practical Secure Sketches Using Off-the-Shelf Biometric Matching Algorithms (2019) (8)
- TLS Client Puzzles Extension (2016) (6)
- Drifting Keys: Impersonation detection for constrained devices (2013) (6)
- An Optimally Robust Hybrid Mix Network ( Extended Abstract ) (2001) (6)
- RFID security and privacy: long-term research or short-term tinkering? (2008) (5)
- Chainlink Off-chain Reporting Protocol (2021) (5)
- Falcon Codes: Fast, Authenticated LT Codes (Or: Making Rapid Tornadoes Unstoppable) (2015) (5)
- Paralysis Proofs: Secure Dynamic Access Structures for Cryptocurrency Custody and More (2019) (5)
- Making Antimalarial Agents Available in Africa (2005) (5)
- Attribute-Based Encryption : Using Identity-Based Encryption for Access Control (4)
- Securing the Data in Big Data Security Analytics (2013) (4)
- Financial Cryptography: 8th International Conference, FC 2004, Key West, FL, USA, February 9-12, 2004. Revised Papers (2004) (4)
- Strategic Latency Reduction in Blockchain Peer-to-Peer Networks (2022) (4)
- The interplay of neuroscience and cryptography: technical perspective (2014) (3)
- Proceedings of the 3rd ACM workshop on Secure web services (2006) (3)
- Power games in RFID security (2009) (3)
- Reassembling Our Digital Selves (2016) (3)
- The Hydra Framework for Principled, Automated Bug Bounties (2019) (3)
- RFID security: in the shoulder and on the loading dock (2008) (3)
- Proceedings of the 13th ACM Conference on Computer and Communications Security, CCS 2006, Alexandria, VA, USA, Ioctober 30 - November 3, 2006 (2006) (3)
- Secure Brokered Delegation Through DelegaTEE (2019) (2)
- In Response to: Letter to the Editor Regarding: "A Security Analysis of the Verichip Implantable RFID Device" (2007) (2)
- The Ekiden Platform for Confidentiality-Preserving, Trustworthy, and Performant Smart Contracts (2020) (2)
- Falcon Codes: Fast, Authenticated LT Codes (2014) (2)
- Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics): Preface (2007) (2)
- Forsage: Anatomy of a Smart-Contract Pyramid Scheme (2021) (1)
- RFID security and privacy : 7th International Workshop, RFIDSec 2011, Amherst, MA, USA, June 26-28, 2011 : revised selected papers (2012) (1)
- The Outer Limits of RFID Security (2006) (1)
- Future Tense: The primal cue (2010) (1)
- Hidden Cliques as Cryptographic Keys (1996) (1)
- Solidus : Confidential Distributed Ledger Transactions via PVORM Extended Version (2017) (1)
- Biometrics in electronic travel documents (2010) (1)
- Honeywords : making password-cracking detectable Citation (2013) (1)
- Session details: Cryptography and cryptoanalysis (2007) (0)
- Privacy-Preserving Public Auditing Based Storage in Cloud Architecture (2016) (0)
- Technical Perspective : The Interplay of Neuroscience and Cryptography ( Preprint ) (2014) (0)
- Proceedings of the 3rd ACM Workshop On Secure Web Services, SWS 2006, Alexandria, VA, USA, November 3, 2006 (2006) (0)
- The Physical Basis of RFID Security (2010) (0)
- Session details: Security, privacy & ethics (2006) (0)
- Proactive Secret Sharing in Dynamic Environments (2019) (0)
- Jeu de Paume : A Security Suite for Handheld Devices (2013) (0)
- Puzzled Solutions and Sources (2010) (0)
- FlipIt: The Game of “Stealthy Takeover” (2012) (0)
- NFTs for Art and Collectables: Primer and Outlook (2022) (0)
- Security of Blind Digital Signatures ( Revised Extended Abstract ) (2006) (0)
- Proceedings of the 2006 ACM Workshop on Wireless Security, Los Angeles, California, USA, September 29, 2006 (2006) (0)
- Proceedings of the 2006 Workshop on Digital Identity Management, Alexandria, VA, USA, November 3, 2006 (2006) (0)
- Proceedings of the 2013 ACM workshop on Cloud computing security workshop (2013) (0)
- Proceedings of the 7th international conference on RFID Security and Privacy (2011) (0)
- Report on “ Honeywords : Making Password-Cracking Detectable ” (2015) (0)
- Proprietary Certificates ( Extended Abstract ) (2005) (0)
- A Two-Server , Sealed-Bid Auction Protocol ( Extended Abstract ) (2002) (0)
- C R ] 3 S ep 2 01 9 DECO : Liberating Web Data Using Dec entralized O racles for TLS (2019) (0)
- X-Cash : Exe utable Digital Cash (2007) (0)
- Proceedings of the 1st ACM Workshop on Scalable Trusted Computing, STC 2006, Alexandria, VA, USA, November 3, 2006 (2006) (0)
- GoAT: File Geolocation via Anchor Timestamping (2021) (0)
- A New Distribution Sensitive Secure Sketch and a Comparison Between Approaches to Typo-Tolerant Authentication (2017) (0)
- GenoGuard SP ZhicongHuang (2015) (0)
- Proceedings of the 12th ACM Conference on Computer and Communications Security, CCS 2005, Alexandria, VA, USA, November 7-11, 2005 (2005) (0)
- Complete Knowledge: Preventing Encumbrance of Cryptographic Secrets (2023) (0)
- 1566 THz-Wave Spectroscopy Applied to the Detection of Illicit Drugs in Mail (2007) (0)
- RFID: Security and Privacy for Five-Cent Computers (2004) (0)
- Fifth ACM cloud computing security workshop (CCSW 2013) (2013) (0)
- Re: RIN 1400-AB93 Electronic Passport (2005) (0)
- on consumer Privacy and Data security (2008) (0)
- Logique de validation floue (2000) (0)
This paper list is powered by the following services: