I am a Professor in Cryptography and Security at University College London
(UCL) and a Staff Research Scientist at Google. At UCL, I am affiliated
with the Information Security Group in the
Computer Science department.
I am also an Associate Director of the
Initiative for Cryptocurrencies and
Contracts (IC3).| [C : NeurIPS] | Privacy Reasoning in
Ambiguous Contexts
|
| [C : CCS] | Founding
Zero-Knowledge Proofs of Training on Optimum Vicinity
|
| [C : ICML] | Machine Learning
Models Have a Supply Chain Problem
|
| [C : Oakland] | Supporting Human Raters
with the Detection of Harmful Content Using Large Language Models
|
| [C : IMC] | Give and Take: An
End-to-End Investigation of Giveaway Scam Conversion Rates
|
| [C : USENIX Security] | Understanding
Help-Seeking and Help-Giving on Social Media for Image-Based Sexual
Abuse
|
| [C : Crypto] | Bingo: Adaptivity and Asynchrony in
Verifiable Secret Sharing and Distributed Key Generation
(slides)
|
| [C : USENIX Security] | ACORN: Input
Validation for Secure Aggregation
|
| [C : USENIX Security] | One Server for the Price of Two:
Simple and Fast Single-Server Private Information Retrieval
|
| [C : FC] | Forsage: Anatomy of a
Smart-Contract Pyramid Scheme
|
| [C : USENIX Security] | How to Peel a
Million: Validating and Expanding Bitcoin Clusters
(slides)
|
| [J : PETS] | SoK: SCT Auditing in Certificate Transparency
(slides)
|
| [C : PODC] | Reaching
Consensus for Asynchronous Distributed Key Generation
|
| [C : Eurocrypt] | Aggregatable Distributed Key
Generation
|
| [C : DIS] | Problematising Transparency Through LARP And Deliberation
|
| [C : Oakland] | SoK: Hate, Harassment, and the
Changing Landscape of Online Abuse
|
| [W : WTSC] | Pay to Win: Cheap, Cross-Chain
Bribing Attacks on PoW Cryptocurrencies
|
| [W : WTSC] | SoK: Algorithmic Incentive
Manipulation Attacks on Permissionless PoW Cryptocurrencies
|
| [C : FC] | An Empirical Analysis of Privacy in the
Lightning Network
|
| [M : Brookings] | Design Choices for Central Bank Digital Currency: Policy and Technical Considerations
|
| [J : PETS] | Reputable List Curation from
Decentralized Voting (concurrent
version)
|
| [C : Asiacrypt] | Quisquis: A New Design for
Anonymous Cryptocurrencies
|
| [C : CCS] | Sonic: Zero-Knowledge SNARKs from Linear-Size Universal and Updatable Structured Reference Strings |
| [C : AFT] | SoK: Consensus in the Age of
Blockchains
|
| [C : AFT] | PISA: Arbitration Outsourcing for
State Channels
|
| [C : USENIX Security] | Tracing Transactions Across
Cryptocurrency Ledgers
|
| [C : FC] | Why is a Ravencoin Like a
TokenDesk? An Exploration of Code Diversity in the Cryptocurrency
Landscape (short version) (slides)
|
| [C : NDSS] | Coconut: Threshold Issuance Selective Disclosure Credentials with Applications to Distributed Ledgers |
| [W : CBT] | Contour: A Practical System for Binary
Transparency
|
| [C : Crypto] | Updatable and Universal Common
Reference Strings with Applications to zk-SNARKs
|
| [C : USENIX Security] | An Empirical Analysis of Anonymity in Zcash |
| [J : S&P] | Top Ten Obstacles along Distributed
Ledgers' Path to Adoption (slides)
|
| [J : PETS] | Möbius: Trustless
Tumbling for Transaction Privacy
|
| [W : BITCOIN] | Egalitarian Society or Benevolent Dictatorship? The State of
Cryptocurrency Governance
|
| [W : BITCOIN] | Smart Contracts for Bribing Miners |
| [W : CBT] | Who Am I? Secure Identity
Registration on Distributed Ledgers
|
| [C : Asiacrypt] | Déjà Q
All Over Again: Tighter and Broader Reductions of q-Type Assumptions
|
| [C : CCS] | Transparency Overlays and Applications
(slides)
|
| [J : CACM] | A Fistful of Bitcoins: Characterizing
Payments Among Men with No Names
|
| [C : NDSS] | Centrally Banked Cryptocurrencies
(slides)
|
| [C : PKC] | A Profitable Sub-Prime Loan: Obtaining the
Advantages of Composite Order in Prime-Order Bilinear Groups
|
| [W : BITCOIN] | Privacy-Enhancing Overlays in
Bitcoin (slides)
|
| [C : CCS] | Algebraic MACs and Keyed-Verification Anonymous
Credentials
|
| [J : TCAD] | Leveraging Gate-Level Properties to
Identify Hardware Timing Channels
|
| [C : CSF] | Malleable Signatures: New Definitions and
Delegatable Anonymous Credentials
|
| [C : Eurocrypt] | Key-Versatile Signatures and
Applications: RKA, KDM, and Joint Enc/Sig
|
| [C : Eurocrypt] | Déjà Q: Using Dual Systems
to Revisit q-Type Assumptions
(slides)
|
| [M : Thesis] | Flexible Models for Secure Systems (slides) |
| [C : NDSS] | Botcoin: Monetizing Stolen Cycles
|
| [C : CT-RSA] | Rethinking Verifiably Encrypted
Signatures: A Gap in Functionality and Potential Solutions
(slides)
|
| [J : login] | A Fistful of Bitcoins: Characterizing
Payments Among Men with No Names
|
| [C : IMC] | A Fistful of Bitcoins: Characterizing Payments
Among Men with No Names
(slides)
|
| [C : DATE] | A Practical Testing Framework for
Isolating Hardware Timing Channels
|
| [C : TCC] | Succinct Malleable NIZKs and an Application
to Compact Shuffles
(slides)
|
| [C : PKC] | Verifiable Elections That Scale for Free
(slides)
|
| [C : Eurocrypt] | Malleable Proof Systems and
Applications
(slides)
|
| [C : USENIX Security] | The Phantom Tollbooth: Privacy-Preserving
Electronic Toll Collection in the Presence of Driver Collusion
(slides)
|
| [W : WOOT] | Heat of the Moment: Characterizing the
Efficacy of Thermal Camera-Based Attacks
(slides)
|
| [C : Asiacrypt] | Limitations on Transformations from
Composite-Order to Prime-Order Groups: The Case of Round-Optimal Blind
Signatures
(slides)
|
| [C : USENIX Security] | ZKPDL: A Language-Based System for Efficient Zero-Knowledge Proofs and Electronic Cash (slides) |
| [M : Thesis] | An Extension of the Groth-Sahai Proof
System
|