Ian Goldberg
#7,473
Most Influential Person Now
Cryptographer
Ian Goldberg's AcademicInfluence.com Rankings
Ian Goldbergcomputer-science Degrees
Computer Science
#552
World Rank
#572
Historical Rank
Database
#1295
World Rank
#1366
Historical Rank
Download Badge
Computer Science
Ian Goldberg's Degrees
- PhD Computer Science University of California, Berkeley
Similar Degrees You Can Earn
Why Is Ian Goldberg Influential?
(Suggest an Edit or Addition)According to Wikipedia, Ian Avrum Goldberg is a cryptographer and cypherpunk. He is best known for breaking Netscape's implementation of SSL , and for his role as chief scientist of Radialpoint , a Canadian software company. Goldberg is currently a professor at the Faculty of Mathematics of the David R. Cheriton School of Computer Science within the University of Waterloo, and the Canada Research Chair in Privacy Enhancing Technologies. He was formerly Tor Project board of directors chairman, and is one of the designers of off the record messaging.
Ian Goldberg's Published Works
Published Works
- Intercepting mobile communications: the insecurity of 802.11 (2001) (1099)
- A secure environment for untrusted helper applications confining the Wily Hacker (1996) (500)
- Constant-Size Commitments to Polynomials and Their Applications (2010) (342)
- A Secure Environment for Untrusted Helper Applications (1996) (334)
- Effective Attacks and Provable Defenses for Website Fingerprinting (2014) (319)
- Off-the-record communication, or, why not to use PGP (2004) (314)
- Improved website fingerprinting on Tor (2013) (255)
- Privacy-enhancing technologies for the Internet (1997) (237)
- Louis, Lester and Pierre: Three Protocols for Location Privacy (2007) (223)
- SkypeMorph: protocol obfuscation for Tor bridges (2012) (207)
- Improving the Robustness of Private Information Retrieval (2007) (193)
- A Systematic Approach to Developing and Evaluating Website Fingerprinting Defenses (2014) (191)
- SoK: Secure Messaging (2015) (183)
- Telex: Anticensorship in the Network Infrastructure (2011) (179)
- Randomness and the Netscape browser (1996) (178)
- Settling Payments Fast and Private: Efficient Decentralized Routing for Path-Based Transactions (2017) (174)
- Walkie-Talkie: An Efficient Defense Against Passive Website Fingerprinting Attacks (2017) (150)
- Revisiting the Computational Practicality of Private Information Retrieval (2011) (139)
- Privacy-Enhancing Technologies for the Internet, II: Five Years Later (2002) (124)
- On Realistically Attacking Tor with Website Fingerprinting (2016) (122)
- Achieving Efficient Query Privacy for Location Based Services (2010) (120)
- Optimally Robust Private Information Retrieval (2012) (118)
- A pseudonymous communications infrastructure for the internet (2000) (112)
- Sphinx: A Compact and Provably Secure Mix Format (2009) (111)
- Improving Tor using a TCP-over-DTLS Tunnel (2009) (109)
- An improved algorithm for tor circuit scheduling (2010) (101)
- Distributed Private-Key Generators for Identity-Based Cryptography (2010) (95)
- Reaction Attacks against several Public-Key Cryptosystems (1999) (95)
- PIR-Tor: Scalable Anonymous Communication Using Private Information Retrieval (2011) (93)
- Changing of the guards: a framework for understanding and improving entry guard selection in tor (2012) (90)
- Congestion-Aware Path Selection for Tor (2012) (86)
- Pairing-Based Onion Routing (2007) (84)
- DefenestraTor: Throwing Out Windows in Tor (2011) (81)
- Privacy-Preserving Queries over Relational Databases (2010) (80)
- TAZ Servers and the Rewebber Network: Enabling Anonymous Publishing on the World Wide Web (1998) (77)
- Enhancing Tor's performance using real-time traffic classification (2012) (75)
- Distributed Key Generation for the Internet (2009) (74)
- Performance and Security Improvements for Tor (2016) (74)
- DP5: A Private Presence Service (2015) (70)
- PrivEx: Private Collection of Traffic Statistics for Anonymous Communication Networks (2014) (69)
- Sublinear Scaling for Multi-Client Private Information Retrieval (2015) (66)
- Anonymity and one-way authentication in key exchange protocols (2013) (64)
- The Path Less Travelled: Overcoming Tor's Bottlenecks with Traffic Splitting (2013) (60)
- On the Security of the Tor Authentication Protocol (2006) (60)
- Privacy Pass: Bypassing Internet Challenges Anonymously (2018) (58)
- Improved user authentication in off-the-record messaging (2007) (57)
- Practical PIR for electronic commerce (2011) (56)
- Provably Secure and Practical Onion Routing (2012) (54)
- Pairing-Based Onion Routing with Improved Forward Secrecy (2010) (50)
- Making a Nymbler Nymble Using VERBS (2010) (50)
- Leading Johnny to Water: Designing for Usability and Trust (2015) (50)
- Distributed Key Generation in the Wild (2012) (48)
- Formalizing Anonymous Blacklisting Systems (2011) (48)
- FROST: Flexible Round-Optimized Schnorr Threshold Signatures (2020) (47)
- Practical Robust Communication in DHTs Tolerating a Byzantine Adversary (2010) (45)
- Multi-party off-the-record messaging (2009) (43)
- One (Block) Size Fits All: PIR and SPIR with Variable-Length Records via Multi-Block Queries (2013) (42)
- Privacy Enhancing Technologies for the Internet III : Ten Years Later ∗ (1997) (40)
- Slitheen: Perfectly Imitated Decoy Routing through Traffic Replacement (2016) (40)
- BridgeSPA: improving Tor bridges with single packet authorization (2011) (39)
- SoK: Making Sense of Censorship Resistance Systems (2016) (38)
- PCTCP: per-circuit TCP-over-IPsec transport for anonymous communication overlay networks (2013) (37)
- Lower-Cost ∈-Private Information Retrieval (2016) (37)
- The Best of Both Worlds: Combining Information-Theoretic and Computational PIR for Communication Efficiency (2014) (37)
- Deniable Key Exchanges for Secure Messaging (2015) (35)
- A user study of off-the-record messaging (2008) (32)
- Proofs of Security for the Unix Password Hashing Algorithm (2000) (31)
- A Cryptanalysis of the High-Bandwidth Digital Content Protection System (2001) (30)
- Improved Strongly Deniable Authenticated Key Exchanges for Secure Messaging (2018) (29)
- Outsourced private information retrieval (2013) (27)
- Generalizing cryptosystems based on the subset sum problem (2011) (26)
- Experience with Top Gun Wingman: a proxy-based graphical web browser for the 3Com PalmPilot (2009) (25)
- Towards Practical Communication in Byzantine-Resistant DHTs (2013) (25)
- Using Sphinx to Improve Onion Routing Circuit Construction (2010) (24)
- Architectural considerations for cryptanalytic hardware (1997) (22)
- Reaction Attacks Against Several Public-Key Cryptosystem (1997) (22)
- The Ninja Jukebox (1999) (21)
- Batch Proofs of Partial Knowledge (2013) (20)
- Differentially Private Learning Does Not Bound Membership Inference (2020) (19)
- SPEcTRe: spot-checked private ecash tolling at roadside (2011) (19)
- Walkie-Talkie: An Effective and Efficient Defense against Website Fingerprinting (2015) (19)
- Secure asymmetry and deployability for decoy routing systems (2018) (17)
- Thinking inside the BLAC box: smarter protocols for faster anonymous blacklisting (2013) (17)
- Polynomial Commitments (2010) (15)
- Solving Discrete Logarithms in Smooth-Order Groups with CUDA 1 (2012) (15)
- Some Results on the Existence of $t$ -All-or-Nothing Transforms Over Arbitrary Alphabets (2017) (14)
- Robot Social Engineering: Attacking Human Factors with Non-Human Actors (2018) (14)
- Extending Nymble-like Systems (2011) (14)
- A Taxonomy of Internet Censorship Resistance Strategies (2012) (14)
- Relational-Complete Private Information Retrieval (2007) (13)
- Security of the WEP algorithm (Wired Equivalent Privacy) (2002) (12)
- A Description of Protocols for Private Credentials (2001) (11)
- Adding query privacy to robust DHTs (2011) (11)
- A Framework for the Game-theoretic Analysis of Censorship Resistance (2016) (9)
- ConsenSGX: Scaling Anonymous Communications Networks with Trusted Execution Environments (2019) (8)
- Making a Nymbler Nymble using VERBS (Extended Version) (2010) (8)
- Slipping Past the Cordon : A Systematization of Internet Censorship Resistance (2015) (7)
- Mitigator: Privacy policy compliance using trusted hardware (2020) (7)
- Investigating Membership Inference Attacks under Data Dependencies (2020) (7)
- Once is Never Enough: Foundations for Sound Statistical Inference in Tor Network Experimentation (2021) (7)
- All-but-k Mercurial Commitments and their Applications † (2012) (6)
- SoK: Privacy-Preserving Reputation Systems (2020) (6)
- KleeQ : Asynchronous Key Management for Dynamic Ad-Hoc Networks (2007) (6)
- TAZ servers and the rewebber network (1998) (5)
- Lavinia: An Audit-Payment Protocol for Censorship-Resistant Storage (2017) (5)
- Elxa: Scalable Privacy-Preserving Plagiarism Detection (2016) (5)
- Proceedings of the 19th USENIX conference on Security (2010) (5)
- A New Message Recognition Protocol with Self-recoverability for Ad Hoc Pervasive Networks (2009) (5)
- Anonymity and one-way authentication in key exchange protocols (2012) (5)
- On message recognition protocols: recoverability and explicit confirmation (2010) (5)
- Walking Onions: Scaling Anonymity Networks while Protecting Users (2020) (5)
- Financial Cryptography and Data Security: 23rd International Conference, FC 2019, Frigate Bay, St. Kitts and Nevis, February 18–22, 2019, Revised Selected Papers (2019) (4)
- Electronic privacy and surveillance (2014) (4)
- Network-Based Website Fingerprinting (2019) (4)
- Privacy Tradeoffs: Myth or Reality? Panel (2002) (4)
- A Survey of Anonymous Blacklisting Systems (2010) (4)
- Live Lesson: Netsim: Network simulation and hacking for high schoolers (2017) (3)
- Style Counsel: Seeing the (Random) Forest for the Trees in Adversarial Code Stylometry (2018) (3)
- Lower-Cost epsilon-Private Information Retrieval (2016) (3)
- High Performance Tor Experimentation from the Magic of Dynamic ELFs (2018) (3)
- Privacy Enhancing Technologies, 9th International Symposium, PETS 2009, Seattle, WA, USA, August 5-7, 2009. Proceedings (2009) (3)
- How not to design a privacy system: reflections on the process behind the Freedom product (2000) (2)
- ZXAD: High-volume Attack Mitigation for Tor (2021) (1)
- Privacy Enhancing Technologies, 8th International Symposium, PETS 2008, Leuven, Belgium, July 23-25, 2008, Proceedings (2008) (1)
- Low-Cost Mitigation Against Cold Boot Attacks for an Authentication Token (2016) (1)
- Randomness and the Netscape Browser January 1996 (2009) (1)
- Proceedings of the 9th International Symposium on Privacy Enhancing Technologies (2008) (1)
- OUStralopithecus: Overt User Simulation for Censorship Circumvention (2021) (1)
- Censorship Resistance: Let a Thousand Flowers Bloom? (2014) (1)
- ZXAD (2021) (1)
- Augmented Unlocking Techniques for Smartphones Using Pre-Touch Information (2019) (1)
- Mind the Gap: Ceremonies for Applied Secret Sharing (2020) (1)
- Shatter Secrets: Using Secret Sharing to Cross Borders with Encrypted Devices (2018) (1)
- Polynomial Commitments ∗ Aniket (2010) (0)
- Shatter Secrets: Using Secret Sharing to Cross Borders with Encrypted Devices (Transcript of Discussion) (2018) (0)
- Privacy Enhancing Technologies (2008) (0)
- PRSONA: Private Reputation Supporting Ongoing Network Avatars (2022) (0)
- Red button and yellow button: usable security for lost security tokens (Position paper) (2016) (0)
- Poster : Atoms of Style : Identifying the Authors of Program Binaries (2016) (0)
- The Globalization of the National Basketball Association: Measuring the Impact and Valuation of Foreign Players (2012) (0)
- A Formal Treatment of Distributed Key Generation, and New Constructions (2023) (0)
- OUStralopithecus (2021) (0)
- Duoram: A Bandwidth-Efficient Distributed ORAM for 2- and 3-Party Computation (2022) (0)
- ZXAD: Zero-knowledge Exit Abuse Detection for Tor (2021) (0)
- Online Harms and Lawful Access: A Submission to the Government of Canada (2021) (0)
- PRSONA (2022) (0)
- Plinko: polling with a physical implementation of a noisy channel (2009) (0)
- Improving the Privacy of Tor Onion Services (2022) (0)
- Lecture Notes in Computer Science: Foreward (2008) (0)
- Astrape: Anonymous Payment Channels with Boring Cryptography (2022) (0)
- Privacy Tradeoffs: Myth or Reality? (Panel Summary) (2003) (0)
- Do You Feel a Chill?: Using PIR against Chilling Effects for Censorship-resistant Publishing (2021) (0)
- FROST: Flexible Round-Optimized Schnorr Threshold signatures [Extended Abstract] (2020) (0)
- Weaving a Faster Tor: A Multi-Threaded Relay Architecture for Improved Throughput (2021) (0)
- Coalition Letter to President Obama Requesting that the White House Oppose Anti-Encryption Legislation (2016) (0)
- SoK: Metadata-Protecting Communication Systems (2023) (0)
- Pass : Bypassing Internet Challenges Anonymously (2018) (0)
- Poster: Novel Website Fingerprinting Techniques (2013) (0)
- Poster: Practical PIR for Electronic Commerce (2007) (0)
- Poster: The Path Less Traveled: Overcoming Tor’s Bottlenecks with Traffic Splitting (2013) (0)
- Lower-Cost (cid:15) -Private Information Retrieval (2016) (0)
- Using Private Information Retrieval (2011) (0)
- Red Button and Yellow Button: Usable Security for Lost Security Tokens (2016) (0)
- Fast Fully Oblivious Compaction and Shuffling (2022) (0)
- Raphael R . Toledo , George Danezis , and Ian Goldberg Lower-Cost-Private Information Retrieval (2016) (0)
- Poster : Incentivized Censorship Resistance with Payment Contracts (2015) (0)
This paper list is powered by the following services:
Other Resources About Ian Goldberg
What Schools Are Affiliated With Ian Goldberg?
Ian Goldberg is affiliated with the following schools: