PORs: Proofs of retrievability for large files A Juels, BS Kaliski Jr Proceedings of the 14th ACM conference on Computer and communications …, 2007 | 2885 | 2007 |
RFID security and privacy: A research survey A Juels IEEE journal on selected areas in communications 24 (2), 381-394, 2006 | 2786 | 2006 |
A fuzzy commitment scheme A Juels, M Wattenberg Proceedings of the 6th ACM conference on Computer and communications …, 1999 | 2251 | 1999 |
A fuzzy vault scheme A Juels, M Sudan Designs, Codes and Cryptography 38, 237-257, 2006 | 2213 | 2006 |
Stealing machine learning models via prediction {APIs} F Tramèr, F Zhang, A Juels, MK Reiter, T Ristenpart 25th USENIX security symposium (USENIX Security 16), 601-618, 2016 | 2100 | 2016 |
On Scaling Decentralized Blockchains: (A Position Paper) K Croman, C Decker, I Eyal, AE Gencer, A Juels, A Kosba, A Miller, ... International conference on financial cryptography and data security, 106-125, 2016 | 1615 | 2016 |
HAIL: A high-availability and integrity layer for cloud storage KD Bowers, A Juels, A Oprea Proceedings of the 16th ACM conference on Computer and communications …, 2009 | 1425 | 2009 |
The blocker tag: selective blocking of RFID tags for consumer privacy A Juels, RL Rivest, M Szydlo Proceedings of the 10th ACM conference on Computer and communications …, 2003 | 1380 | 2003 |
Cross-VM side channels and their use to extract private keys Y Zhang, A Juels, MK Reiter, T Ristenpart Proceedings of the 2012 ACM conference on Computer and communications …, 2012 | 1053 | 2012 |
Authenticating pervasive devices with human protocols A Juels, SA Weis Advances in Cryptology–CRYPTO 2005: 25th Annual International Cryptology …, 2005 | 978 | 2005 |
Client puzzles: A cryptographic countermeasure against connection depletion attacks A Juels Proc. Networks and Distributed System Security Symposium (NDSS), 1999, 1999 | 933* | 1999 |
Coercion-resistant electronic elections A Juels, D Catalano, M Jakobsson Proceedings of the 2005 ACM Workshop on Privacy in the Electronic Society, 61-70, 2005 | 844 | 2005 |
Proofs of retrievability: Theory and implementation KD Bowers, A Juels, A Oprea Proceedings of the 2009 ACM workshop on Cloud computing security, 43-54, 2009 | 819 | 2009 |
Proofs of work and bread pudding protocols M Jakobsson, A Juels Communications and Multimedia Security, 258-272, 1999 | 804 | 1999 |
Town crier: An authenticated data feed for smart contracts F Zhang, E Cecchetti, K Croman, A Juels, E Shi Proceedings of the 2016 aCM sIGSAC conference on computer and communications …, 2016 | 791 | 2016 |
RFID privacy: An overview of problems and proposed solutions SL Garfinkel, A Juels, R Pappu IEEE Security & Privacy 3 (3), 34-43, 2005 | 767 | 2005 |
Minimalist cryptography for low-cost RFID tags A Juels Security in Communication Networks: 4th International Conference, SCN 2004 …, 2005 | 720 | 2005 |
Flash boys 2.0: Frontrunning in decentralized exchanges, miner extractable value, and consensus instability P Daian, S Goldfeder, T Kell, Y Li, X Zhao, I Bentov, L Breidenbach, ... 2020 IEEE symposium on security and privacy (SP), 910-927, 2020 | 704* | 2020 |
Universal re-encryption for mixnets P Golle, M Jakobsson, A Juels, P Syverson Topics in Cryptology–CT-RSA 2004: The Cryptographers’ Track at the RSA …, 2004 | 625 | 2004 |
Squealing Euros: Privacy Protection in RFID-Enabled Banknotes A Juels, R Pappu Financial Cryptography, Lecture Notes in Computer Science 2742, 103-121, 2004 | 615 | 2004 |