Cryptography and Security
-
Probabilistic Data Structures in Adversarial Environments
David Clayton, Christopher Patton and Thomas Shrimpton
To appear at ACM CCS 2019
-
Security in the Presence of Key Reuse: Context-Separable Interfaces and Their Applications
[pdf]
Christopher Patton and Thomas Shrimpton
Appeared at CRYPTO 2019
-
Partially specified channels: The TLS 1.3 record layer without elision
[pdf]
Christopher Patton and Thomas Shrimpton
Appeared at ACM CCS 2018
-
Mitigating Risk while Complying with Data Retention Laws
Luis Vargas, Gyan Hazarika, Rachel Culpepper, Kevin Butler, Thomas Shrimpton, Doug Szajda, Patrick Traynor
Appeared at ACM CCS 2018
-
Standardizing Bad Cryptographic Practice: A teardown of the IEEE Standard for protecting electronic-design intellectual property
Animesh Chhotaray, Adib Nahiyan, Thomas Shrimpton, Domenic Forte and Mark Tehranipoor
Appeared at ACM CCS 2017
-
AuthentiCall: Efficient Identity and Content Authentication for Phone Calls
Bradley Reaves, Logan Blue, Hadi Abdullah, Luis Vargas, Patrick Traynor and Thomas Shrimpton
Appeared at USENIX Security 2017
-
Hedging Public-key Encryption in the Real World
[pdf]
Alexandra Boldyreva, Christopher Patton and Thomas Shrimpton
Appeared at CRYPTO 2017
-
Salvaging Weak Security Bounds for Blockcipher-Based Constructions
[pdf]
Thomas Shrimpton and R. Seth Terashima
Appeared at ASIACRYPT 2016
-
Network Protocol Obfuscation and Automated Internet Censorship
[pdf]
Lucas Dixon, Thomas Ristenpart and Thomas Shrimpton
Appeared in IEEE Security and Privacy
-
A Modular Treatment of Cryptographic APIs: the Symmetric-Key Case
[pdf]
Thomas Shrimpton, Martijn Stam and Bogdan Warinschi
Appeared at CRYPTO 2016
-
Seeing Through Network-Protocol Obfuscation
[pdf]
Liang Wang, Kevin P. Dyer, Aditya Akella, Thomas Ristenpart and Thomas Shrimpton
Appeared at ACM CCS 2015
-
Marionette: A Programmable Network Traffic Obfuscation System
[pdf]
Kevin P. Dyer, Scott Coull, and Thomas Shrimpton
Appeared at USENIX Security 2015
Also covered in MIT Technology Review
[article] and Engadget [article]
-
A Provable-Security Analysis of Intel's Secure Key RNG
[pdf]
Thomas Shrimpton and R. Seth Terashima
Appeared at Advances in Cryptology -- EUROCRYPT'15
-
Formatted Encryption Beyond Regular Languages
[pdf]
Daniel Luchaup, Thomas Shrimpton, Thomas Ristenpart and Somesh Jha
Appeared at ACM CCS 2014
-
LibFTE: A Toolkit for Construction Practical, Format-Abiding Encryption Schemes
[pdf]
Daniel Luchaup, Kevin P. Dyer, Somesh Jha, Thomas Ristenpart, and Thomas Shrimpton
Appeared at USENIX Security 2014
-
Reconsidering Generic Composition
[pdf]
Chanathip Namprempre, Phillip Rogaway and Thomas Shrimpton
Appeared at EUROCRYPT 2014
-
Protocol Misidentification Made Easy with Format-Transforming Encryption
[pdf]
Kevin Dyer, Scott Coull, Thomas Ristenpart and Thomas Shrimpton
Appeared at ACM CCS 2013
2014 Privacy Enhancing Technologies Award, Runner Up
[link]
-
A Modular Framework for Building Variable-Input-Length Tweakable Ciphers
[pdf]
Thomas Shrimpton and R. Seth Terashima
Appeared at Advances in Cryptology -- ASIACRYPT'13
-
Format Transforming Encryption: More than Meets the DPI
[pdf]
Kevin Dyer, Scott Coull, Thomas Ristenpart and Thomas Shrimpton
Technical Report
-
Tweakable Blockciphers with Beyond Birthday Bound Security
[pdf]
Will Landecker, Thomas Shrimpton and R. Seth Terashima
Appeared at Advances in Cryptology -- CRYPTO '12
-
Peek-a-Boo, I Still See You: Why Traffic Analysis Countermeasures Fail
[pdf]
Kevin Dyer, Scott Coull, Thomas Ristenpart and Thomas Shrimpton
Appeared at IEEE Security and Privacy 2012
-
Tag Size Does Matter: Attacks and Proofs for the TLS Record Protocol
Kenneth G. Paterson, Thomas Ristenpart and Thomas Shrimpton
Appeared at Advances in Cryptology -- ASIACRYPT '11
-
Careful With Composition: Limitations of
Indifferentiability and Universal Composability
[pdf]
Thomas Ristenpart, Hovav Shacham and Thomas Shrimpton
Appeared at Advances in Cryptology -- EUROCRYPT '11
(under the title
"Careful With Composition: Limitations of the Indifferentiability Framework")
-
Random Oracles With(out) Programmability
[pdf]
Marc Fischlin, Anja Lehmann,
Thomas Ristenpart, Thomas Shrimpton,
Martijn Stam and Stefano Tessaro
Appeared at Advances in Cryptology -- ASIACRYPT '10
-
Attacking the Knudsen-Preneel Compression Function
Onur Özen, Thomas Shrimpton and Martijn Stam
[pdf]
Appeared at Fast Software Encryption'10
Awarded "Best Paper"
-
Salvaging Merkle-Damgard for Practical Applications
Yevgeniy Dodis, Thomas Ristenpart and Thomas Shrimpton
[pdf]
Appeared at Advances in Cryptology -- EUROCRYPT'09
-
Building a Collision-Resistant Compression Function from Non-Compressing Primitives
[pdf]
Thomas Shrimpton and Martijn Stam
Appeared at ICALP'08
-
How To Build A Hash Function from Any Collision-Resistant Function
[pdf]
Thomas Ristenpart and Thomas Shrimpton
Appeared at Advances in Cryptology -- ASIACRYPT '07
-
Seven-Property Preserving Iterated Hashing: ROX
[pdf]
Elena Andreeva, Gregory Neven, Bart Preneel and Thomas Shrimpton
Appeared at Advances in Cryptology -- ASIACRYPT '07
-
Deterministic Authenticated Encryption:
A Provable-Security Treatment of the Keywrap Problem
[pdf]
Phillip Rogaway and Thomas Shrimpton
A retitled, full version of what appeared at
Advances in Cryptology -- EUROCRYPT '06
(Specification of the associated Synthetic-IV
mode of operation [pdf]; now RFC 5297)
-
Threshold Password-Authenticated Key Exchange
[pdf]
[ps]
Philip MacKenzie, Thomas Shrimpton, and Markus Jakobsson
Appears in the Journal of Cryptology, 2006
(An extended abstract appeared at Advances in Cryptology -- CRYPTO '02)
-
On the Impossibility of Highly Efficient Blockcipher-Based Hash
Functions
[pdf]
John Black, Martin Cochran and Thomas Shrimpton
Appeared at Advances in Cryptology -- EUROCRYPT '05
-
Cryptographic Hash Function Basics: Definitions, Implications, and
Separations
for Preimage Resistance, Second-Preimage Resistance, and
Collision Resistance
[pdf]
Phillip Rogaway and Thomas Shrimpton
Appeared at Fast Software Encryption '04
- Black-Box Analysis of the Block-Cipher-Based Hash-Function
Constructions from PGV
[pdf]
[ps]
John Black, Phillip Rogaway, and Thomas Shrimpton
Appeared at Advances in Cryptology -- CRYPTO '02
- Encryption-Scheme Security in the Presence
of Key-Dependent Messages
[pdf]
[ps]
John Black, Phillip Rogaway, and Thomas Shrimpton
Appeared at Selected Areas in Cryptography -- SAC '02
  Signal processing and Networking
-
Verifying Delivered QoS in Multi-hop Wireless Networks
[pdf]
Suresh Singh and Thomas Shrimpton
To appear in IEEE Transactions on Mobile Computing, 2007
-
Source Enumeration Using a Signal Selective Information Theoretic
Criterion
Stephan Schell and Thomas Shrimpton
Appeared at IEEE MILCOM, Monterey, CA, 1997
-
Super-Exponentially Convergent Blind Fractionally Spaced Equalization
and Cochannel Interference Mitigation
Stephan Schell and Thomas Shrimpton
Appeared at IEEE MILCOM, McLean, VA, USA, 1996
-
Super-Exponentially Convergent Blind Fractionally Spaced Equalization
Stephan Schell and Thomas Shrimpton
Appeared at 29th Asilomar Conference, Pacific Grove, CA, USA,
1995