Publications / Patents

Here’s a fairly complete list of my scientific papers. You can find bibliometrics on most of them in Google Scholar.

For an up-to-date list of my issued patents on the UPSTO website, click here.


[CZJK+17] E. Cecchetti, F. Zhang, Y. Ji, A. Kosba, A. Juels, and E. Shi. Solidus: Confidential Distributed Ledger Transactions via PVORM. 2017. In submission.

[MAKD+17] S. Matetic, M. Ahmed, K. Kostiainen, A. Dhar, D. Sommer, A. Gervais, A. Juels, and S. Capkun. ROTE: Rollback Protection for Trusted Execution. 2017. In submission.

[ZEEJ+17] F. Zhang, I. Eyal, R. Escriva, A. Juels, and R. van Renesse. REM: Resource-Efficient Mining for Blockchains. USENIX Security, 2017. To appear.

[TZLH+17] F. Tramèr, F. Zhang, H. Lin, J.-P. Hubaux, A. Juels, and E. Shi. Sealed-Glass Proofs: Using Transparent Enclaves to Prove and Sell Knowledge. In IEEE Euro S&P, 2017.

[TAGH+17] F. Tramèr, V. Atlidakis, R. Geambasu, D. Hsu, J.-P. Hubaux, M. Humbert, A. Juels, and H. Lin. FairTest: Discovering Unwarranted Associations in Data-Driven Applications. In IEEE Euro S&P, 2017.

[DEJS17] P. Daian, I. Eyal, A. Juels, and G. Sirer. PieceWork: Generalized Outsourcing Control for Proofs of Work. In BITCOIN Workshop, 2017.


[ZCCJ+16] F. Zhang, E. Cecchetti, K. Croman, A. Juels, and E. Shi. Town Crier: An Authenticated Data Feed for Smart Contracts. ACM CCS, pp. 270-282, 2016. Slides here.

[JKS16] A. Juels, A. Kosba, and E. Shi. The Ring of Gyges: Investigating the Future of Criminal Smart Contracts. ACM CCS, pp. 283-295, 2016.

[TZJR+16] F. Tramèr, F. Zhang, A. Juels, M. Reiter, and T. Ristenpart. Stealing Machine Learning Models via Prediction APIs. USENIX Security, pp. 601-618, 2016.

[MJ16] W. Marino and A. Juels. Setting Standards for Altering and Undoing Smart Contracts. Rule ML, pp. 151-166, 2016.

[HJ16] J.-P. Hubaux and A. Juels. Privacy is dead, long live privacy: Protecting social norms as confidentiality wanes. Communications of the ACM (CACM). 59(6): 39-41, June 2016.

[CAAJ+16] R. Chatterjee, A. Athayle, D. Akawhe, A. Juels, and T. Ristenpart. pASSWORD tYPOS and How to Correct Them Securely. IEEE Symposium on Security and Privacy (SP), pp. 800-816, 2016. (Distinguished Student Paper Award)

[CDEG+16] K. Croman, C. Decker, I. Eyal, A. E. Gencer, A. Juels, A. Kosba, A. Miller, P. Saxena, E. Shi, E. G. Sirer, D. Song, and R. Wattenhofer. On Scaling Decentralized Blockchains. BITCOIN, 2016.

[EJ16] D. Estrin and A. Juels. Reassembling Our Digital Selves. Daedalus, Journal of the American Academy of Arts & Sciences, 145(1): 43–53, Winter 2016.


[ECSJ+15] A. Everspaugh, R. Chatterjee, S. Scott, A. Juels, and T. Ristenpart. The Pythia PRF Service. USENIX Security, pp. 547-562, 2015. 

[HAHF+15] Z. Huang, E. Ayday, J.-P. Hubaux, J. Fellay, and A. Juels. GenoGuard: Protecting Genomic Data against Brute-Force Attacks. IEEE Symposium on Security and Privacy (SP), pp. 447-462, 2015. (Distinguished Student Paper Award)

[CBJR15] R. Chatterjee, J. Bonneau, A. Juels, and T. Ristenpart. Cracking-Resistant Password Vaults using Natural Language Encoders. IEEE Symposium on Security and Privacy (SP), pp. 481-498, 2015.

[DGGJ+15] Y. Dodis, C. Ganesh, A. Golovnev, A. Juels and T. Ristenpart,
A Formal Treatment of Backdoored Pseudorandom Generators. EUROCRYPT, pp. 101-126, 2015. 


[ZJRR14] Y. Zhang, A. Juels, M. Reiter, and T. Ristenpart. Cross-Tenant Side-Channel Attacks in PaaS Clouds. ACM CCS, pp. 990-1003, 2014.

[YHOR+14] T.-F. Yen, V. Heorhiadi, A. Oprea, M. K. Reiter, and A. Juels. An Epidemiological Study of Malware Encounters in a Large Enterprise. ACM CCS, pp. 1117-1130, 2014.

[BHJT14] K. Bowers, C. Hart, A. Juels, and N. Triandopoulos. PillarBox: Combating Next-Generation Malware with Fast Forward-Secure Logging. RAID, pp. 46-67, 2014. [Draft paper available here.]

[JR14b] A. Juels and T. Ristenpart. Honey Encryption: Encryption Beyond the Brute-Force Barrier. IEEE Security & Privacy Magazine, 12(4): 59-62, 2014.

[J14] A. Juels. A bodyguard of lies: the use of honey objects in information security. SACMAT, pp. 1-4, 2014.

[MJSP+14]  A. Miller, A. Juels, E. Shi, B. Parno, and J. Katz. PermaCoin: Repurposing Bitcoin Work for Long-Term Data Preservation. IEEE Symposium on Security and Privacy (SP), 2014. [Draft paper available here.]

[JR14a] A. Juels and T. Ristenpart. Honey Encryption: Security Beyond the Brute-Force Bound. EUROCRYPT, pp. 293-310, 2014.

[JW14] A. Juels and B. Wong. The Interplay of Neuroscience and Cryptography. Communications of the ACM (CACM), 56(2): 64-73, May 2014.


[YOOL+13] T.-F. Yen, A. Oprea, K. Onarlioglu, T. Leetham, A. Juels, E. Kirda, and W. Robertson. Beehive: Large-Scale Log Analysis for Detecting Suspicious Activity in Enterprise Networks. Annual Computer Security Applications Conference (ACSAC), 2013.

[JR13] A. Juels and R. L. Rivest. Honeywords: Making Password-Cracking Detectable. ACM Computer and Communications Security (ACM CCS), pp. 145-160, 2013. (Note: See also the Honeywords Project Page.)

[RJK13] M. Rostami, A. Juels, and F. Koushanfar. Heart-to-Heart (H2H): Authentication for Implanted Medical Devices. ACM Computer and Communications Security (ACM CCS), pp. 1099-1112, 2013. (NYU-Poly Best Applied Security Paper Award, 2nd place.)

[vDJOR13] M. van Dijk, A. Juels, A. Oprea, and R. L. Rivest. FlipIt: The Game of “Stealthy Takeover”. Journal of Cryptology 26(4): 655-713, 2013.

[RBJK13] M. Rostami, W. Burleson, A. Juels, and F. Koushanfar. Balancing Security and Utility in Medical Devices. ACM Design Automation Conference (DAC), Article no. 13, 2013.

[BJRS13] K. Bowers, A. Juels, R. Rivest, and E. Shen. Drifting Keys: Impersonation Detection for Constrained Devices. IEEE INFOCOM, pp. 1025-1033, 2013.

[AO13] A. Juels and A. Oprea. New Approaches to Security and Availability for Cloud Data. Communications of the ACM (CACM) 56(2): 64-73, February 2013.

[ZCJ13] D. Zanetti, S. Capkun, and A. Juels. Tailing RFID Tags for Clone Detection. Networks and Distributed Security Systems (NDSS), 2013.


[SvDOJ12] E. Stefanov, M. van Dijk, A. Oprea, and A. Juels. Iris: A Scalable Cloud File System with Efficient Integrity Checks. Annual Computer Security Applications Conference (ACSAC), pp. 229-238, 2012. (NYU-Poly/AT&T Best Applied Security Paper Award, 3rd place.)

[vDJOR+12] M. van Dijk, A. Juels, A. Oprea, R. L. Rivest, E. Stefanov, and N. Triandopoulos. Hourglass Schemes: How to Prove That Cloud Files Are Encrypted. ACM Computer and Communications Security (ACM CCS), pp. 265-280, 2012. [Slides]

[YJRR12] Y. Zhang, A. Juels, M. K. Reiter, and T. Ristenpart. Cross-VM Side Channels and Their Use to Extract Private Keys. ACM Computer and Communications Security (ACM CCS), pp. 305-316, 2012.

[FVBJ+12] B. Farley, V. Varajarajan, K.D. Bowers, A. Juels, T. Ristenpart, and M. M. Swift. More for Your Money: Exploiting Performance Heterogeneity in Public Clouds. Symposium on Cloud Computing (SoCC): 20, 2012.

[BvDGJ+12] K. D. Bowers, M. van Dijk, R. Griffin, A. Juels, A. Oprea, R. L. Rivest, and N. Triandopoulos. Defending against the Unknown Enemy: Applying FlipIt to System Security. GameSec, pp. 248-263, 2012.

[JY12] A. Juels and T.F. Yen. Sherlock Holmes and the Case of the Advanced Persistent Threat. USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET): 2, 2012.


[BvDJO+11] K. Bowers, M. van Dijk, A. Juels, A. Oprea, and R. Rivest. How to Tell if Your Cloud Files Are Vulnerable to Drive Crashes. ACM Computer and Communications Security (ACM CCS), pp. 501-514, 2011.

[ZJOR11] Y. Zhang, A. Juels, A. Oprea, M. K. Reiter. Homealone: Co-Residency Detection in the Cloud via Side-Channel Analysis. IEEE Symposium on Security and Privacy (SP), pp. 313-328, 2011.

[DBvDJ11] T. Denning, K. D. Bowers, M. van Dijk, and A. Juels. Exploring Implicit Memory for Painless Password Recovery. International Conference on Human Factors in Computing Systems (CHI), pp. 2615-2618, 2011.

[JFP11] A. Juels, K. Fu, and C. Paar, Eds. 7th Workshop on RFID Security and Privacy (RFIDSec). Lec­tu­re Notes in Com­pu­ter Sci­ence 7055, Sprin­ger, Am­herst, MA, USA,  2011.


[OJ10] A. Oprea and A. Juels. A Clean-Slate Look at Disk Scrubbing. USENIX Conference on File and Storage Technologies (FAST), pp. 57-70, 2010.

[J10b] A. Juels. Future tense: The Primal Cue. Communications of the ACM (CACM), 53(3): 120-ff,  2010.

[JCJ10] A. Juels, D. Catalano, and M. Jakobsson. Coercion-Resistant Electronic Elections. Towards Trustworthy Elections, pp. 37-63, 2010. (Workshop version appeared as [JCJ05].)

[J10a] A. Juels: The Physical Basis of RFID Security. RFIDSec. 2010. (Abstract of keynote talk.)

[JvD10] M. van Dijk and A. Juels. On the Impossibility of Cryptography Alone for Privacy-Preserving Cloud Computing. USENIX Workshop on Hot Topics in Security (HotSec), 2010.


[BJO09a] K. D. Bowers, A. Juels, and A. Oprea. HAIL: A High-Availability and Integrity Layer for Cloud Storage.  ACM Conference on Computer and Communications Security (ACM CCS), pp. 187-198, 2009.

[KJKB09]  K. Koscher, A. Juels, T. Kohno, and V. Brajkovic. EPC RFID Tag Security Weaknesses and Defenses: Passport Cards, Enhanced Drivers Licenses, and Beyond.  ACM Conference on Computer and Communications Security (ACM CCS), pp. 187-198, 2009. (FAQ available here.)

[JW09] A. Juels and S. Weis. Defining Strong Privacy for RFID. ACM Transactions on Information and System Security (TISSEC): 13(1), 2009.

[J09] A. Juels: Power Games in RFID Security. IEEE International Conference for Internet Technology and Secured Transactions (ICITST), p. 1, 2009. (Abstract of keynote talk.) [Slides]

[SCRF+09] M. Salajegheh, S. S. Clark, B. Ransford, K. Fu, and A. Juels. CCCP: Secure Remote Storage for Computational RFIDs. USENIX Security Symposium, pp. 215-230, 2009.

[JJ09] M. Jakobsson and A. Juels. Server-Side Detection of Malware Infection. New Security Paradigms Workshop, pp. 11-22, 2009.

[BJO09b] K. Bowers, A. Juels, and A. Oprea. Proofs of Retrievability: Theory and Implementation.  ACM Cloud Computing Security Workshop (CCSW), pp. 43-54, 2009.


[K08] T. Kohno. An Interview with RFID Security Expert Ari Juels. IEEE Pervasive Computing, 7(1):10-11, 2008.

[JPP08] A. Juels, B. Parno, and R. Pappu.  Unidirectional Key Distribution Across Time and Space with Applications to RFID Security. USENIX Security Symposium, pp. 75-90, 2008.

[JJR08] M. Jakobsson, A. Juels, and Jacob Ratkiewicz. Privacy-Preserving History Mining for Web Browsers. Web 2.0 Security and Privacy, 2008.

[J08] A. Juels. RFID security: in the shoulder and on the loading dock. ACM conference on Wireless network security (WiSec), p.1, 2008. (Abstract of keynote talk.) [Slides]

[TBJK+08] G. Tsudik, M. Burmester, A. Juels, A. Kobsa, D. Molnar, R. Di Pietro, M. R. Rieback. RFID security and privacy: long-term research or short-term tinkering? ACM conference on Wireless network security (WiSec), p.160, 2008. (Abstract of panel.)


[J07] A. Juels. The Vision of Secure RFID. Proceedings of the IEEE, 95(8): 1507-8, Aug. 2007.

[CEJM+07] S. G. Choi, A. Elbaz, A. Juels, T. Malkin, and M. Yung. Two-Party Computing with Encrypted Data. Advances in Cryptology–ASIACRYPT, pp. 298-314, 2007.

[JK07] A. Juels and B. Kaliski. PORs: Proofs of Retrievability for Large Files. ACM Conference on Computer and Communications Security (ACM CCS), pp. 584–597, 2007.

[BBGJ07] D. Bailey, D. Boneh, E.-J. Goh, and A. Juels. Covert Channels in Privacy-Preserving Identification Systems. ACM Conference on Computer and Communications Security (ACM CCS), pp. 297-306, 2007.

[JW07] A. Juels and S. Weis. Defining Strong Privacy for RFID (Extended abstract). PerCom Workshops (PerTec), pp. 342-347, 2007.

[JSJ07] A. Juels, S. Stamm, and M. Jakobsson. Combatting Click Fraud via Premium Clicks. USENIX Security Symposium, pp. 17–26, 2007.

[HBFJ+07] T. S. Heydt-Benjamin, D. V. Bailey, K. Fu, A. Juels, and T. O’Hare. Vulnerabilities in First-Generation RFID-Enabled Credit Cards. Financial Cryptography and Data Security, pp. 2-14, 2007.

[BFJ07] B. Defend, K. Fu, and A. Juels. Cryptanalysis of Two Lightweight RFID Authentication Schemes. Percom Workshops (PerSec), pp. 211-216, 2007.


[BJ06] D. Bailey and A. Juels. Shoehorning Security into the EPC Standard. Security and Cryptography for Networks (SCN), pp. 303-320, 2006.

[HJSW06] J. Halamka, A. Juels, A. Stubblefield, and J. Westhues. The Security Implications of VeriChip Cloning. Journal of the American Medical Informatics Association (JAMIA) 13(6): 601-607, 2006.

[BJRS+06] J. Brainard, A. Juels, R. Rivest, M. Szydlo, and M. Yung. Fourth Factor Authentication: Somebody You Know. ACM Conference on Computer and Communications Security (ACM CCS), pp. 168-178, 2006. (Note: See the Facebook’s Trusted Contacts system.)

[JJJ06] A. Juels, M. Jakobsson, and T. Jagatic. Cache Cookies for Browser Authentication (Extended Abstract). IEEE Symposium on Security and Privacy (SP), pp. 301-305, 2006.

[J06a] A. Juels.  RFID security and privacy: a research survey. Journal of Selected Areas in Communication (J-SAC) 24(2): 381-394, 2006. (IEEE Best Tutorial Paper Award, 2007.)

[JS06] A. Juels and M. Sudan. A Fuzzy Vault Scheme. Designs, Codes, and Cryptography 38(2): 237-257, 2006.

[J06b] A. Juels: The Outer Limits of RFID Security. Cryptographic Hardware and Embedded Systems (CHES), p. 231, 2006. (Abstract of invited talk.)


[JSB05] A. Juels, P. Syverson, and D. Bailey. High-Power Proxies for Enhancing RFID Privacy and Utility. Privacy Enhancing Technologies (PET), pp. 210-226, 2005.

[BGSJ+05] S.C. Bono, M. Green, A. Stubblefield, A. Juels, A. D. Rubin, and M. Syzdlo.  Security Analysis of a Cryptographically-Enabled RFID Device. USENIX Security Symposium, pp. 1-16, 2005. (Best Student Paper Award, USENIX Security and  Outstanding Research Award in Privacy Enhancing Technologies, 2007.)

[J05a] A. Juels. RFID Privacy: A Technical Primer for the Non-Technical Reader. In K. Strandburg, ed., Privacy and Identity: The Promise and Perils of a Technological Age. Springer. 2005.

[J05b] A. Juels. Attack on a Cryptographic RFID Device. Guest column in RFID Journal. 28 Feb. 2005.

[J05c] A. Juels. A Bit of Privacy. Guest column in RFID Journal. 2 May 2005.

[JMW05] A. Juels, D. Molnar, and D. Wagner. Security Issues in E-Passports. SecureComm, pp.74-88, 2005.

[JW05] A. Juels and S. Weis. Authenticating Pervasive Devices with Human Protocols. Advances in Cryptology–CRYPTO, pp. 293-308, 2005.

[JCJ05] A. Juels, D. Catalano, and M. Jakobsson. Coercion-Resistant Electronic Voting. Workshop on Privacy in the Electronic Society (WPES), pp. 61-70, 2005.

[JRG05] A. Juels, R. Pappu, and S. Garfinkel. RFID Privacy: An Overview of Problems and Proposed Solutions. IEEE Security and Privacy, 3(3): 34-43. May/June 2005.

[JSB05] A. Juels, P. Syverson, and D. Bailey. High-Power Proxies for Enhancing RFID Privacy and Utility. Privacy Enhancing Technologies (PET), pp. 210-226, 2005.

[J05d] A. Juels. Strengthening EPC Tags Against Cloning. Workshop on Wireless Security (WiSec), pp. 67-76, 2005.

[JCJ05] A. Juels, D. Catalano, and M. Jakobsson. Coercion-Resistant Electronic Elections. Workshop on Privacy in the Electronic Society (WPES), pp. 61-70, 2005. (Journal version appeared as [JCJ10].)


[J04a] A. Juels, ed., Financial Cryptography, 8th International Conference, Revised Papers. Springer-Verlag. LNCS no. 3110. 2004.

[GJ04a] P. Golle and A. Juels. Parallel Mixing. ACM Conference on Computer and Communications Security (ACM CCS), pp. 220-226, 2004.

[GJ04b] P. Golle and A. Juels. Dining Cryptographers Revisited. Advances in Cryptology–EUROCRYPT, pp. 456-473, 2004.

[WJHF04] B. Waters, A. Juels, A. Halderman, and E. Felten. New Client Puzzle Outsourcing Techniques for DoS Resistance. ACM Conference on Computer and Communications Security (ACM CCS), pp. 246-256, 2004.

[JB04] A. Juels and J. Brainard. Soft Blocking: Flexible Blocker Tags on the Cheap. Workshop on Privacy in the Electronic Society (WPES), pp.1-7, 2004.

[J04b] A. Juels. Minimalist Cryptography for RFID Tags. Security in Communication Networks (SCN), pp. 149-164, 2004.

[J04c] A. Juels. “Yoking-Proofs” for RFID Tags. IEEE Annual Conference on Pervasive Computing and Communications Workshops (PERCOMW), pp.138—143, 2004.

[J04d] A. Juels. RFID: security and privacy for five-cent wireless devices. Workshop on Wireless Security (WiSec), p. 31, 2004. (Abstract of keynote talk.)

[J04e] A. Juels. RFID: Security and Privacy for Five-Cent Computers. USENIX Security Symposium. (Abstract of invited talk.) [Slides

[GJJS04] P. Golle, M. Jakobsson, A. Juels, and P. Syverson. Universal Re-Encryption for Mixnets. RSA Conference Cryptographers’ Track (CT-RSA), pp. 163-178, 2004.

[JS04] A. Juels and M. Szydlo. Attribute-Based Encryption: Using Identity-Based Encryption for Access Control.  Manuscrupt. 17 June 2004. (Note: Introduced the term and concept of ABE, with an early construction.)


[JRS03] A. Juels, R. L. Rivest, and M. Szydlo. The Blocker Tag: Selective Blocking of RFID Tags for Consumer Privacy (full version). ACM Conference on Computer and Communications Security (ACM CCS), pp. 103-111, 2003. [Slides]

[BJKS03] J. Brainard, A. Juels, B. Kaliski, and M. Szydlo. A New Two-Server Approach for Authentication with Short Secrets. USENIX Security Symposium, pp. 201–214, 2003. (Realized years later as the RSA Distributed Credential Protection product.)

[JP03] A. Juels and R. Pappu. Squealing Euros: Privacy-Protection in RFID-Enabled Banknotes. Financial Cryptography, pp. 103-121, 2003. [Slides]


[JS02] A. Juels and M. Sudan. A Fuzzy Vault Scheme [full version]. International Symposium on Information Theory (ISIT), p. 408, 2002.

[JJR02] M. Jakobsson, A. Juels, and R. Rivest. Making Mix Nets Robust for Electronic Voting by Randomized Partial Checking. USENIX Security Symposium, pp. 339-353, 2002.

[JS02b] A. Juels and M. Szydlo. A Two-Server Sealed-Bid Auction Protocol. Financial Cryptography, pp. 72-86, 2002. [Slides]

[JJN02] M. Jakobsson, A. Juels, and P. Nguyen. Proprietary Certificates. RSA Conference Cryptographers’ Track (CT-RSA), pp. 164-181, 2002.

[GZBJ+02] P. Golle, S. Zhong, D. Boneh, M. Jakobsson, and A. Juels. Optimistic Mixing for Exit-Polls. Advances in Cryptology – ASIACRYPT, pp. 451-465, 2007.

[JG02] A. Juels and J. Guajardo. RSA Key Generation with Verifiable Randomness. Public Key Cryptography (PKC), pp. 357-374, 2002.

[FJJ02] N. Frykholm, A. Juels, and M. Jakobsson, Jeu de Paume: A Security Suite for Handheld Devices. Manuscript, 2002. [Slides]


[FJ01] N. Frykholm and A. Juels. An Error-Tolerant Password Recovery Scheme. ACM Conference on Computer and Communications Security (ACM CCS), pp. 1-9, 2001. [Slides]

[JJ01] A. Juels and M. Jakobsson. An Optimally Robust Hybrid Mix Network. Principles of Distributed Computing (PODC), pp. 284-292, 2001.

[J01] A. Juels. Targeted Advertising… And Privacy Too. RSA Conference Cryptographers’ Track (CT-RSA), pp. 408-424, 2001. [Slides]


[JJ00a] M. Jakobsson and A. Juels. Mix and Match: Secure Function Evaluation via Ciphertexts. Advances in Cryptology–ASIACRYPT, pp. 346-358, 2000. [Slides]

[JJ00b] M. Jakobsson and A. Juels. Addition of ElGamal Plaintexts.  Advances in Cryptology–ASIACRYPT, pp. 346-358, 2000.

[HJJY00] J. Håstad, J. Jonsson, A. Juels, and M. Yung. Funkspiel Schemes: An Alternative to Conventional Tamper Resistance.  ACM Conference on Computer and Communications Security (ACM CCS), pp. 125-133, 2000. [Slides] (Note: Inspired by the story of Hubertus Lauwers.)

[JP00] A. Juels and M. Peinado. Hiding Cliques for Cryptographic Security. Designs, Codes, and Cryptography 20(3): 269-280, 2000. (Conference version in Symposium on Discrete Algorithms (SODA), pp. 678-684, 1998.)

[JJSH00] A. Juels, M. Jakobsson, E. Shriver, and B. Hillyer. How to Turn Loaded Dice into Fair Coins.  IEEE Transactions on Information Theory 46(3): 911-921, 2000.


[JW99] A. Juels and M. Wattenberg. A Fuzzy Commitment Scheme. ACM Conference on Computer and Communications Security (ACM CCS), pp. 28-36, 1999. [Slides]

[JJ99a] M. Jakobsson and A. Juels. Proofs of Work and Bread Pudding Protocols. Communications and Multimedia Security (CMS), pp. 258-272, 1999. [Slides]

[JB99] A. Juels and J. Brainard. Client Puzzles: A Cryptographic Defense Against Connection Depletion Attacks. Networks and Distributed Security Systems (NDSS), pp. 151-165, 1999. [Slides]

[J99] A. Juels. Trustee Tokens: Simple and Practical Tracing of Anonymous Digital Cash. Financial Cryptography, pp. 29-45, 1999. [Slides]

[JJ99b] M. Jakobsson and A. Juels. Millimix: Mixing in Small Batches. Manuscript, 1999. (Published as DIMACS TR 99 – 33.)

1998 and earlier

[JSHJ98] M. Jakobsson, L. Shriver, B. Hillyer, and A. Juels. A Practical Secure Physical Random Bit Generator. ACM Conference on Computer and Communications Security (ACM CCS), pp. 103-111, 1998.

[JJ98] M. Jakobsson and A. Juels. X-Cash: Executable Digital Cash. Financial Cryptography, pp. 16-27, 1998. [Slides] (A concept very much like scripting in Bitcoin.)

[J98] A. Juels. The Equilibrium Genetic Algorithm (EGA). Manuscript, 1998. (Note: Unpublished material from my PhD dissertation and earlier graduate work.)

[JLO97] A. Juels, M. Luby, and R. Ostrovsky. Security of Blind Digital Signatures (Extended Abstract). Advances in Cryptology–CRYPTO, pp. 150-164, 1997.
A. Juels. Topics in Black-Box Combinatorial Optimization. U.C. Berkeley Ph.D. Dissertation. 1996.

[JW95] A. Juels and M. Wattenberg. Stochastic hillclimbing as a Baseline Method for Evaluating Genetic Algorithms. Advances in Neural Information Processing Systems (NIPS), pp. 430-436, 1995.