Home - Topics - Papers - Theses - Blog - CV - Photos - Funny

Cryptography

E-Vote Your Conscience: Perceptions of Coercion and Vote Buying, and the Usability of Fake Credentials in Online Voting

May 20 2024

Authenticated Private Information Retrieval

Aug 10 2023

Flash Freezing Flash Boys: Countering Blockchain Front-Running

Jul 10 2022

Auditing the Swiss Post E-voting System: An Architectural Perspective

Apr 4 2022

3PBCS: A Privacy-Preserving, Personhood-Based Credential System – Ksandros Apostoli

Mar 22 2022

TRIP: Trustless Coercion-Resistant In-Person Voter Registration

Feb 14 2022

Integrity and Metadata Protection in Data Retrieval – Kirill Nikitin

Nov 26 2021

Privacy-Preserving Federated Analytics using Multiparty Homomorphic Encryption – David Jules Froelicher

Oct 1 2021

Analyzing and Protecting Communication Metadata – Ludovic Barman

Sep 17 2021

CALYPSO: Private Data Management for Decentralized Ledgers

Aug 16 2021

Design choices for Central Bank Digital Currency

Jul 23 2020

PriFi: Low-Latency Anonymity for Organizational Networks

Jul 13 2020

Secure, Confidential Blockchains Providing High Throughput and Low Latency – Eleftherios Kokoris Kogias

Sep 27 2019

Reducing Metadata Leakage from Encrypted Files and Communication with PURBs

Jul 18 2019

On the Security of Two-Round Multi-Signatures

May 20 2019

MedChain: Accountable and Auditable Data Sharing in Distributed Medical Scenarios

Mar 25 2019

MedCo: Enabling Secure and Privacy-Conscious Exploration of Distributed Clinical and Genomic Data

Jul 13 2018

CHAINIAC: Proactive Software-Update Transparency via Collectively Signed Skipchains and Verified Builds

Aug 18 2017

How Do You Know It's On the Blockchain? With a SkipChain.

Aug 1 2017

UnLynx: A Decentralized System for Privacy-Conscious Data Sharing

Jul 19 2017

Scalable Bias-Resistant Distributed Randomness

May 23 2017

Multiple Objectives of Lawful-Surveillance Protocols

Mar 20 2017

Privacy-Preserving Lawful Contact Chaining

Oct 24 2016

Enhancing Bitcoin Security and Performance with Strong Consistency via Collective Signing

Aug 10 2016

Riffle: An Efficient Communication System With Strong Anonymity

Jul 19 2016

Open, privacy-preserving protocols for lawful surveillance

Jul 13 2016

Keeping Authorities “Honest or Bust” with Decentralized Witness Cosigning

May 23 2016

AnonRep: Towards Tracking-Resistant Anonymous Reputation

Mar 16 2016

Building Privacy-Preserving Cryptographic Credentials from Federated Online Identities

Mar 16 2016

Apple, FBI, and Software Transparency

Mar 10 2016

Collectively Witnessing Log Servers in CT

Oct 20 2015

Seeking Anonymity in an Internet Panopticon

Oct 1 2015

Identity Management through Privacy-Preserving Authentication – Ewa Syta

Aug 11 2015

Private Eyes: Secure Remote Biometric Authentication

Jul 20 2015

Certificate Cothority: Towards Trustworthy Collective CAs

Jul 2 2015

Building Privacy-Preserving Cryptographic Credentials from Federated Online Identities – John Maheswaran

Jun 24 2015

Open Surveillance

Oct 21 2014

Catching Bandits and Only Bandits: Privacy-Preserving Intersection Warrants for Lawful Surveillance

Aug 18 2014

Security Analysis of Accountable Anonymity in Dissent

Aug 1 2014

A TorPath to TorCoin: Proof-of-Bandwidth Altcoins for Compensating Relays

Jul 18 2014

From Onions to Shallots: Rewarding Tor Relays with TEARS

Jul 18 2014

Crypto-Book: An Architecture for Privacy Preserving Online Identities

Nov 22 2013

Conscript Your Friends into Larger Anonymity Sets with JavaScript

Nov 4 2013

Ensuring High-Quality Randomness in Cryptographic Key Generation

Nov 4 2013

Hang With Your Buddies to Resist Intersection Attacks

Nov 4 2013

Proactively Accountable Anonymous Messaging in Verdict

Aug 14 2013

Dissent in Numbers: Making Strong Anonymity Scale

Oct 8 2012

Scavenging for Anonymity with BlogDrop

Jul 9 2012

Strong Theft-Proof Privacy-Preserving Biometric Authentication

May 25 2012

Scalable Anonymous Group Communication in the Anytrust Model

Apr 10 2012

Eyo: Device-Transparent Personal Storage

Jun 15 2011

Dissent: Accountable Anonymous Group Messaging

Oct 4 2010

Efficient Cross-Layer Negotiation

Oct 22 2009

UIA: A Global Connectivity Architecture for Mobile Personal Devices

Sep 1 2008

Alpaca: Extensible Authorization for Distributed Services

Oct 29 2007

Structured Streams: a New Transport Abstraction

Aug 27 2007

Unmanaged Internet Protocol: Taming the Edge Network Management Crisis

Nov 20 2003


Bryan Ford