-
Notifications
You must be signed in to change notification settings - Fork 0
/
index.html
executable file
·1024 lines (919 loc) · 42.3 KB
/
index.html
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
602
603
604
605
606
607
608
609
610
611
612
613
614
615
616
617
618
619
620
621
622
623
624
625
626
627
628
629
630
631
632
633
634
635
636
637
638
639
640
641
642
643
644
645
646
647
648
649
650
651
652
653
654
655
656
657
658
659
660
661
662
663
664
665
666
667
668
669
670
671
672
673
674
675
676
677
678
679
680
681
682
683
684
685
686
687
688
689
690
691
692
693
694
695
696
697
698
699
700
701
702
703
704
705
706
707
708
709
710
711
712
713
714
715
716
717
718
719
720
721
722
723
724
725
726
727
728
729
730
731
732
733
734
735
736
737
738
739
740
741
742
743
744
745
746
747
748
749
750
751
752
753
754
755
756
757
758
759
760
761
762
763
764
765
766
767
768
769
770
771
772
773
774
775
776
777
778
779
780
781
782
783
784
785
786
787
788
789
790
791
792
793
794
795
796
797
798
799
800
801
802
803
804
805
806
807
808
809
810
811
812
813
814
815
816
817
818
819
820
821
822
823
824
825
826
827
828
829
830
831
832
833
834
835
836
837
838
839
840
841
842
843
844
845
846
847
848
849
850
851
852
853
854
855
856
857
858
859
860
861
862
863
864
865
866
867
868
869
870
871
872
873
874
875
876
877
878
879
880
881
882
883
884
885
886
887
888
889
890
891
892
893
894
895
896
897
898
899
900
901
902
903
904
905
906
907
908
909
910
911
912
913
914
915
916
917
918
919
920
921
922
923
924
925
926
927
928
929
930
931
932
933
934
935
936
937
938
939
940
941
942
943
944
945
946
947
948
949
950
951
952
953
954
955
956
957
958
959
960
961
962
963
964
965
966
967
968
969
970
971
972
973
974
975
976
977
978
979
980
981
982
983
984
985
986
987
988
989
990
991
992
993
994
995
996
997
998
999
1000
<!DOCTYPE html>
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en"><head>
<link rel="stylesheet" type="text/css" href="sarah.css" title="default" media="screen">
<link rel="stylesheet" type="text/css" href="blank.css" media="print">
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
<title>Sarah Meiklejohn</title>
<script>
function showItem(item) {
document.getElementById(item).style.display = "block";
}
function hideItem(item) {
document.getElementById(item).style.display = "none";
}
function toggle(item) {
if (document.getElementById(item).style.display == "none") {
showItem(item);
} else {
hideItem(item);
}
}
function openToggle() {
toggle("2025_c");
toggle("2024_c");
toggle("2023_c");
toggle("2022_c");
toggle("2021_c");
toggle("2020_c");
toggle("2019_c");
toggle("2018_c");
toggle("2017_c");
toggle("2016_c");
toggle("2015_c");
toggle("2014_c");
toggle("2013_c");
toggle("2012_c");
toggle("2011_c");
toggle("2010_c");
toggle("2009_c");
toggle("bitcoin");
}
</script>
</head>
<body onload="openToggle()">
<h3>Sarah Meiklejohn</h3><br>
<h2>Bio</h2>
<img src="files/sarah.jpg" class="profpic" alt="Photo of Sarah">
I am a Professor in Cryptography and Security at University College London
(UCL) and a Staff Research Scientist at Google. At UCL, I am affiliated
with the <a title="http://sec.cs.ucl.ac.uk/"
href="http://sec.cs.ucl.ac.uk/">Information Security Group</a> in the
<a title="http://www.cs.ucl.ac.uk"
href="http://www.cs.ucl.ac.uk">Computer Science</a> department.
I am also an Associate Director of the
<a href="http://www.initc3.org/">Initiative for Cryptocurrencies and
Contracts (IC3)</a>.<br>
<br>
I received a PhD in Computer Science from the University of
California, San Diego under the joint supervision of
<a title="http://cs.ucsd.edu/~mihir" href="http://cs.ucsd.edu/~mihir">Mihir Bellare</a>
and <a title="http://cs.ucsd.edu/~savage"
href="http://cs.ucsd.edu/~savage">Stefan Savage</a>. During my PhD, I
spent the summers of 2011 and 2013 at MSR Redmond, working in the cryptography
group with <a
href="http://research.microsoft.com/en-us/um/people/melissac">Melissa
Chase</a>. I obtained an Sc.M. in Computer Science
from Brown University under the guidance of <a
title="http://cs.brown.edu/~anna" href="http://cs.brown.edu/~anna">Anna
Lysyanskaya</a> in 2009, and an Sc.B. in Mathematics from Brown in 2008.
<br>
<h2>Contact</h2>
s.meiklejohn [at] ucl [dot] ac [dot] uk<br>
<br>
Department of Computer Science<br>
University College London<br>
Gower Street<br>
London WC1E 6BT<br>
<h2>Projects</h2>
<ul>
<li><a href="http://www.titanium-project.eu/">TITANIUM</a>: Tools for the
Investigation of Transactions in Underground Markets
(May 2017 – May 2020)</li>
<li><a href="http://glass-houses.cs.ucl.ac.uk">Glass Houses</a>:
Transparency and Privacy in Information Economies
(November 2016 – March 2021)</li>
</ul>
<h2>Supervision</h2>
I am not working full-time at UCL, which means I am not taking on any
postdocs, PhD students, or interns for now. This means that if you email me
asking for such a position I will not respond. Thanks for understanding!<br>
<br>
I am fortunate to have worked with the following people in the past:
<ul style="margin-top:0px;">
<li><a href="https://mariascrs.github.io/">Maria Santos</a> (PhD student
→ postdoc at ENS Lyon)</li>
<li><a href="https://georgekap.github.io/">George Kappos</a> (PhD student
→ Chainalysis)</li>
<li><a href="https://www.haaroonyousaf.com/">Haaroon Yousaf</a> (PhD student
→ Pometry)</li>
<li><a href="https://sazouvi.com/">Sarah Azouvi</a> (PhD
student → Protocol Labs)</li>
<li><a href="https://elizabeth-crites.github.io/">Elizabeth Crites</a>
(postdoc → postdoc at University of Edinburgh → Web3 Foundation)</li>
<li>Mustafa Al-Bassam (PhD student → Celestia)</li>
<li>Kruakae Pothong (postdoc → 5Rights Foundation)</li>
<li><a href="https://www.marymaller.com/">Mary Maller</a> (PhD
student → Ethereum Foundation)</li>
<li><a href="https://srgi.me/">Sergi Delgado Segura</a> (postdoc → Talaia
Labs → Chaincode Labs)</li>
<li>Shehar Bano (postdoc → Facebook)</li>
<li><a href="https://stonecoldpat.github.io/">Patrick
McCorry</a> (postdoc → faculty at King's College London → PISA Research → Arbitrum)</li>
</ul>
<h2>Publications</h2>
(Click year to show/hide)
<!--<table style="padding:10px">
<tr>
<td>[C = Conference]</td>
<td>[J = Journal]</td>
<td>[W = Workshop]</td>
<td>[M = Miscellaneous]</td>
</table>-->
<div id="2025" onclick="toggle('2025_c')"><h4>
<a href='javascript:;'>2025</a></h4></div>
<div id="2025_c">
<table>
<tr>
<td class="a">[C : Oakland]</td>
<td class="p"><a href="https://arxiv.org/abs/2406.12800">Supporting Human Raters with the
Detection of Harmful Content Using Large Language Models</a>
<ul class="p"><li>Kurt Thomas, Patrick Gage Kelley, David Tao, Sarah
Meiklejohn, Owen Vallis, Shunwen Tan, Blaž Bratanič,
Felipe Tiengo Ferreira, Vijay Kumar Eranti, and Elie Bursztein</li>
<li>IEEE Symposium on Security and Privacy</li></ul>
</td></tr>
</table>
</div>
<div id="2024" onclick="toggle('2024_c')"><h4>
<a href='javascript:;'>2024</a></h4></div>
<div id="2024_c">
<table>
<tr>
<td class="a">[C : IMC]</td>
<td class="p"><a href="https://arxiv.org/abs/2405.09757">Give and Take: An
End-to-End Investigation of Giveaway Scam Conversion Rates</a>
<!--(<a href="files/imc24-slides.pdf">slides</a>)-->
<ul class="p"><li>Enze Liu, George Kappos, Eric Mugnier, Luca Invernizzi,
Stefan Savage, David Tao, Kurt Thomas, Geoffrey M. Voelker, and
Sarah Meiklejohn</li>
<li>Internet Measurement Conference</li></ul>
</td></tr>
<tr>
<td class="a">[C : USENIX Security]</td>
<td class="p"><a href="https://arxiv.org/abs/2406.12161">Understanding
Help-Seeking and Help-Giving on Social Media for Image-Based Sexual
Abuse</a>
<ul class="p"><li>Miranda Wei, Sunny Consolvo, Patrick Gage Kelley,
Tadayoshi Kohno, Tara Matthews, Sarah Meiklejohn, Franziska
Roesner, Renee Shelby, Kurt Thomas, and Rebecca Umbach</li>
<li>USENIX Security Symposium</li></ul>
</td></tr>
</table>
</div>
<div id="2023" onclick="toggle('2023_c')"><h4>
<a href='javascript:;'>2023</a></h4></div>
<div id="2023_c">
<table>
<tr>
<td class="a">[C : Crypto]</td>
<td class="p"><a href="files/crypto23.pdf">Bingo: Adaptivity and Asynchrony in
Verifiable Secret Sharing and Distributed Key Generation</a>
(<a href="files/bingo-slides.pdf">slides</a>)
<ul class="p"><li>Ittai Abraham, Philipp Jovanovic, Sarah
Meiklejohn, Mary Maller, and Gilad Stern</li>
<li>Crypto</li></ul>
</td></tr>
<tr>
<td class="a">[C : USENIX Security]</td>
<td class="p"><a href="https://eprint.iacr.org/2022/1461.pdf">ACORN: Input
Validation for Secure Aggregation</a>
<ul class="p"><li>James Bell, Adrià Gascón,
Tancrède Lepoint, Baiyu Li, Sarah Meiklejohn,
Mariana Raykova, and Cathie Yun</li>
<li>USENIX Security Symposium</li></ul>
</td></tr>
<tr>
<td class="a">[C : USENIX Security]</td>
<td class="p"><a href="files/usenix23a.pdf">One Server for the Price of Two:
Simple and Fast Single-Server Private Information Retrieval</a>
<ul class="p"><li>Alexandra Henzinger, Matthew M. Hong, Henry
Corrigan-Gibbs, Sarah Meiklejohn, and Vinod Vaikuntanathan</li>
<li>USENIX Security Symposium</li>
<li>(The source code for this project can be found
<a href="https://github.com/ahenzinger/simplepir">here</a>.)</ul>
</td></tr>
<tr>
<td class="a">[C : FC]</td>
<td class="p"><a href="https://arxiv.org/abs/2105.04380">Forsage: Anatomy of a
Smart-Contract Pyramid Scheme</a>
<ul class="p"><li>Tyler Kell, Haaroon Yousaf, Sarah Allen, Sarah
Meiklejohn, and Ari Juels</li>
<li>Financial Cryptography and Data Security</li>
<li>(The blog post for this project can be found
<a
href="https://medium.com/initc3org/red-flags-for-smart-contract-pyramid-schemes-in-2021-f017022c1e5c">here</a>.)</li></ul>
</td></tr>
</table>
</div>
<div id="2022" onclick="toggle('2022_c')"><h4>
<a href='javascript:;'>2022</a></h4></div>
<div id="2022_c">
<table>
<tr>
<td class="a">[C : USENIX Security]</td>
<td class="p"><a href="files/usenix22.pdf">How to Peel a
Million: Validating and Expanding Bitcoin Clusters</a>
(<a href="files/usenix22-slides.pdf">slides</a>)
<ul class="p"><li>George Kappos, Haaroon Yousaf, Rainer Stütz, Sofia
Rollet, Bernhard Haslhofer, and Sarah Meiklejohn</li>
<li>USENIX Security Symposium</li></ul>
</td></tr>
<tr>
<td class="a">[J : PETS]</td>
<td class="p"><a href="https://arxiv.org/pdf/2203.01661.pdf">SoK: SCT Auditing in Certificate Transparency</a>
(<a href="files/pets22-slides.pdf">slides</a>)
<ul class="p"><li>Sarah Meiklejohn, Joe DeBlasio, Devon O'Brien, Chris
Thompson, Kevin Yeo, and Emily Stark</li>
<li>Proceedings on Privacy Enhancing Technologies</li></ul>
</td></tr>
</table>
</div>
<div id="2021" onclick="toggle('2021_c')"><h4>
<a href='javascript:;'>2021</a></h4></div>
<div id="2021_c">
<table>
<tr>
<td class="a">[C : PODC]</td>
<td class="p"><a href="https://arxiv.org/pdf/2102.09041.pdf">Reaching
Consensus for Asynchronous Distributed Key Generation</a>
<ul class="p"><li>Gilad Stern, Ittai Abraham, Philipp Jovanovic, Sarah
Meiklejohn, Alin Tomescu, and Mary Maller</li>
<li>ACM Symposium on Principles of Distributed Computing</li></ul>
</td></tr>
<tr>
<td class="a">[C : Eurocrypt]</td>
<td class="p"><a href="files/eurocrypt21.pdf">Aggregatable Distributed Key
Generation</a>
<ul class="p"><li>Kobi Gurkan, Philipp Jovanovic, Mary Maller, Sarah
Meiklejohn, Gilad Stern, and Alin Tomescu</li>
<li>Eurocrypt</li>
<li>(The blog post for this project can be found <a
href="https://www.benthamsgaze.org/2021/03/24/aggregatable-distributed-key-generation/">here</a>.)</li></ul>
</td></tr>
<tr>
<td class="a">[C : DIS]</td>
<td class="p"><a href="files/dis21.pdf">Problematising Transparency Through LARP And Deliberation</a>
<ul class="p"><li>Kruakae Pothong, Larissa Pschetz, Ruth Catlow, and Sarah
Meiklejohn</li>
<li>Designing Interactive Systems</li>
<li>(This paper received an Honorable Mention Award!)</li></ul>
</td></tr>
<tr>
<td class="a">[C : Oakland]</td>
<td class="p"><a href="files/oakland21.pdf">SoK: Hate, Harassment, and the
Changing Landscape of Online Abuse</a>
<ul class="p"><li>Kurt Thomas, Devdatta Akhawe, Michael Bailey, Dan Boneh,
Elie Bursztein, Sunny Consolvo, Nicki Dell, Zakir Durumeric, Patrick
Gage Kelley, Deepak Kumar, Damon McCoy, Sarah Meiklejohn,
Thomas Ristenpart, and Gianluca Stringhini</li>
<li>IEEE Symposium on Security and Privacy</li></ul>
</td></tr>
<tr>
<td class="a">[W : WTSC]</td>
<td class="p"><a href="files/wtsc21b.pdf">Pay to Win: Cheap, Cross-Chain
Bribing Attacks on PoW Cryptocurrencies</a>
<ul class="p"><li> Aljosha Judmayer, Nicholas Stifter, Alexei Zamyatin,
Itay Tsabary, Ittay Eyal, Peter Gaži, Sarah Meiklejohn and
Edgar Weippl </li>
<li>The Fifth Workshop on Trusted Smart Contracts</li></ul>
</td></tr>
<tr>
<td class="a">[W : WTSC]</td>
<td class="p"><a href="files/wtsc21a.pdf">SoK: Algorithmic Incentive
Manipulation Attacks on Permissionless PoW Cryptocurrencies</a>
<ul class="p"><li> Aljosha Judmayer, Nicholas Stifter, Alexei Zamyatin,
Itay Tsabary, Ittay Eyal, Peter Gaži, Sarah Meiklejohn and
Edgar Weippl </li>
<li>The Fifth Workshop on Trusted Smart Contracts</li></ul>
</td></tr>
<tr>
<td class="a">[C : FC]</td>
<td class="p"><a href="files/fc21.pdf">An Empirical Analysis of Privacy in the
Lightning Network</a>
<ul class="p"><li>George Kappos, Haaroon Yousaf, Ania M. Piotrowska,
Sanket Kanjalkar, Sergi Delgado-Segura, Andrew Miller, and Sarah
Meiklejohn</li>
<li>Financial Cryptography and Data Security</li></ul>
</td></tr>
</table>
</div>
<div id="2020" onclick="toggle('2020_c')"><h4>
<a href='javascript:;'>2020</a></h4></div>
<div id="2020_c">
<table>
<tr>
<td class="a">[M : Brookings]</td>
<td class="p"><a href="files/cbdc20.pdf">Design Choices for Central Bank Digital Currency: Policy and Technical Considerations</a>
<ul class="p"><li>Sarah Allen, Srdjan Čapkun, Ittay Eyal,
Giulia Fanti, Bryan Ford, James Grimmelman, Ari Juels,
Kari Kostianien, Sarah Meiklejohn, Andrew Miller, Eswar
Prasad, Karl Wüst, and Fan Zhang</li>
<li>Brookings Institute Working Paper</li></ul>
</td></tr>
<tr>
<td class="a">[J : PETS]</td>
<td class="p"><a href="files/pets20.pdf">Reputable List Curation from
Decentralized Voting</a> (<a href="files/pets20mod.pdf">concurrent
version</a>)
<ul class="p"><li>Elizabeth Crites, Mary Maller, Sarah Meiklejohn, and
Rebekah Mercer</li>
<li>Proceedings on Privacy Enhancing Technologies</li>
<li>(The source code for this project can be found <a
href="https://github.com/rbkhmrcr/tcr">here</a>.)</li></ul>
</td></tr>
</table>
</div>
<div id="2019" onclick="toggle('2019_c')"><h4>
<a href='javascript:;'>2019</a></h4></div>
<div id="2019_c">
<table>
<tr>
<td class="a">[C : Asiacrypt]</td>
<td class="p"><a href="files/asiacrypt19.pdf">Quisquis: A New Design for
Anonymous Cryptocurrencies</a>
<ul class="p"><li>Prastudy Fauzi, Claudio Orlandi, Sarah Meiklejohn, and
Rebekah Mercer</li>
<li>Asiacrypt</li></ul>
</td></tr>
<tr>
<td class="a">[C : CCS]</td>
<td class="p"><a href="files/ccs19.pdf">Sonic: Zero-Knowledge SNARKs from
Linear-Size Universal and Updatable Structured Reference Strings</a>
<ul class="p"><li>Mary Maller, Sean Bowe, Markulf Kohlweiss, and
Sarah Meiklejohn</li>
<li>ACM Conference on Computer and Communications Security</li>
<li>(The source code for this project can be found <a
href="https://github.com/ebfull/sonic">here</a>, and the blog post <a
href="https://www.benthamsgaze.org/2019/02/07/introducing-sonic-a-practical-zk-snark-with-a-nearly-trustless-setup/">here</a>.)</li></ul>
</td></tr>
<tr>
<td class="a">[C : AFT]</td>
<td class="p"><a href="files/aft19a.pdf">SoK: Consensus in the Age of
Blockchains</a>
<ul class="p"><li>Shehar Bano, Alberto Sonnino, Mustafa Al-Bassam, Sarah
Azouvi, Patrick McCorry, Sarah Meiklejohn, and George Danezis</li>
<li>ACM Conference on Advances in Financial Technology</li></ul>
</td></tr>
<tr>
<td class="a">[C : AFT]</td>
<td class="p"><a href="files/aft19b.pdf">PISA: Arbitration Outsourcing for
State Channels</a>
<ul class="p"><li>Patrick McCorry, Surya Bakshi, Iddo Bentov, Sarah
Meiklejohn, and Andrew Miller</li>
<li>ACM Conference on Advances in Financial Technology</li>
<li>(The blog post for this project can be found <a
href="http://hackingdistributed.com/2018/05/22/pisa/">here</a>.)</li></ul>
</td></tr>
<tr>
<td class="a">[C : USENIX Security]</td>
<td class="p"><a href="files/usenix19.pdf">Tracing Transactions Across
Cryptocurrency Ledgers</a>
<ul class="p"><li>Haaroon Yousaf, George Kappos, and
Sarah Meiklejohn</li>
<li>USENIX Security Symposium</li>
<li>(The blog post for this project can be found <a
href="https://www.benthamsgaze.org/2019/08/15/tracing-transactions-across-cryptocurrency-ledgers/">here</a>,
and it was featured in <a
href="https://www.technologyreview.com/2019/08/22/133272/some-crypto-criminals-think-jumping-across-blockchains-covers-their-tracks-big-mistake/">MIT
Technology Review</a>.)</li></ul>
</td></tr>
<tr>
<td class="a">[C : FC]</td>
<td class="p"><a href="files/fc19full.pdf">Why is a Ravencoin Like a
TokenDesk? An Exploration of Code Diversity in the Cryptocurrency
Landscape</a> (<a href="files/fc19short.pdf">short version</a>) (<a
href="files/fc19slides.pdf">slides</a>)
<ul class="p"><li>Pierre Reibel, Haaroon Yousaf, and Sarah Meiklejohn</li>
<li>Financial Cryptography and Data Security</li></ul>
</td></tr>
<tr>
<td class="a">[C : NDSS]</td>
<td class="p"><a href="files/ndss19.pdf">Coconut: Threshold Issuance Selective
Disclosure Credentials with Applications to Distributed Ledgers</a>
<ul class="p"><li>Alberto Sonnino, Mustafa Al-Bassam, Shehar Bano,
Sarah Meiklejohn, and George Danezis</li>
<li>Network and Distributed System Security Symposium</li>
<li>(The source code for this project can be found <a
href="https://github.com/asonnino/coconut">here</a>, and the blog post
<a
href="https://www.benthamsgaze.org/2018/03/09/coconut-threshold-issuance-selective-disclosure-credentials-with-applications-to-distributed-ledgers/">here</a>.)</li></ul>
</td></tr>
</table>
</div>
<div id="2018" onclick="toggle('2018_c')"><h4>
<a href='javascript:;'>2018</a></h4></div>
<div id="2018_c">
<table>
<tr>
<td class="a">[W : CBT]</td>
<td class="p"><a href="files/cbt18.pdf">Contour: A Practical System for Binary
Transparency</a>
<ul class="p"><li>Mustafa Al-Bassam and Sarah Meiklejohn</li>
<li>International Workshop on Cryptocurrencies and Blockchain
Technology</li>
<li>(The source code for this project can be found <a
href="https://github.com/musalbas/contour">here</a>.)</li></ul>
</td></tr>
<tr>
<td class="a">[C : Crypto]</td>
<td class="p"><a href="files/crypto18.pdf">Updatable and Universal Common
Reference Strings with Applications to zk-SNARKs</a>
<ul class="p"><li>Jens Groth, Markulf Kohlweiss, Mary Maller,
Sarah Meiklejohn, and Ian Miers</li>
<li>Crypto</li></ul>
</td></tr>
<tr>
<td class="a">[C : USENIX Security]</td>
<td class="p"><a href="files/usenix18.pdf">An Empirical Analysis of Anonymity
in Zcash</a>
<ul class="p"><li>George Kappos, Haaroon Yousaf, Mary Maller,
and Sarah Meiklejohn</li>
<li>USENIX Security Symposium</li>
<li>(The source code for this project can be found <a
href="https://github.com/manganese/zcash-empirical-analysis">here</a>,
and the blog post <a
href="https://www.benthamsgaze.org/2018/05/09/the-pools-run-dry-analyzing-anonymity-in-zcash/">here</a>.)</li></ul>
</td></tr>
<tr>
<td class="a">[J : S&P]</td>
<td class="p"><a href="files/topten.pdf">Top Ten Obstacles along Distributed
Ledgers' Path to Adoption</a> (<a
href="files/topten-slides.pdf">slides</a>)
<ul class="p"><li>Sarah Meiklejohn</li>
<li>IEEE Security & Privacy Magazine, July/August 2018</li>
<li>(The blog post for this project can be found <a
href="https://www.benthamsgaze.org/2017/07/25/top-ten-obstacles-along-distributed-ledgers-path-to-adoption/">here</a>.)</li></ul>
</td></tr>
<tr>
<td class="a">[J : PETS]</td>
<td class="p"><a href="files/pets18.pdf">Möbius: Trustless
Tumbling for Transaction Privacy</a>
<ul class="p"><li>Sarah Meiklejohn and Rebekah Mercer</li>
<li>Proceedings on Privacy Enhancing Technologies</li>
<li>(The source code for this project can be found <a
href="https://github.com/rbkhmrcr/mobius">here</a>.)</li></ul>
</td></tr>
<tr>
<td class="a">[W : BITCOIN]</td>
<td class="p"><a href="files/bitcoin18b.pdf">Egalitarian Society or Benevolent Dictatorship? The State of
Cryptocurrency Governance</a>
<ul class="p"><li>Sarah Azouvi, Mary Maller, and Sarah Meiklejohn</li>
<li>The Fifth Workshop on Bitcoin and Blockchain Research</li></ul>
</td></tr>
<tr>
<td class="a">[W : BITCOIN]</td>
<td class="p"><a href="files/bitcoin18a.pdf">Smart Contracts for Bribing
Miners</a>
<ul class="p"><li>Patrick McCorry, Alexander Hicks, and Sarah
Meiklejohn</li>
<li>The Fifth Workshop on Bitcoin and Blockchain Research</li>
<li>(The source code for this project can be found <a
href="https://github.com/stonecoldpat/briberycontracts">here</a>, and
the blog post <a
href="https://www.benthamsgaze.org/2018/01/23/smart-contracts-and-bribes/">here</a>.)</li></ul>
</td></tr>
</table>
</div>
<div id="2017" onclick="toggle('2017_c')"><h4>
<a href='javascript:;'>2017</a></h4></div>
<div id="2017_c">
<table>
<tr>
<td class="a">[W : CBT]</td>
<td class="p"><a href="files/cbt17.pdf">Who Am I? Secure Identity
Registration on Distributed Ledgers</a>
<ul class="p"><li>Sarah Azouvi, Mustafa Al-Bassam, and Sarah Meiklejohn</li>
<li>International Workshop on Cryptocurrencies and Blockchain
Technology</li></ul>
</td></tr>
</table>
</div>
<div id="2016" onclick="toggle('2016_c')"><h4>
<a href='javascript:;'>2016</a></h4></div>
<div id="2016_c">
<table>
<tr>
<td class="a">[C : Asiacrypt]</td>
<td class="p"><a href="files/asiacrypt16.pdf">Déjà Q
All Over Again: Tighter and Broader Reductions of q-Type Assumptions</a>
<ul class="p"><li>Melissa Chase, Mary Maller, and Sarah Meiklejohn</li>
<li>Asiacrypt</li></ul>
</td></tr>
<tr>
<td class="a">[C : CCS]</td>
<td class="p"><a href="files/ccs16.pdf">Transparency Overlays and Applications</a>
(<a href="files/ccs16-slides.pdf">slides</a>)
<ul class="p"><li>Melissa Chase and Sarah Meiklejohn</li>
<li>ACM Conference on Computer and Communications Security</li></ul>
</td></tr>
<tr>
<td class="a">[J : CACM]</td>
<td class="p"><a
href="http://cacm.acm.org/magazines/2016/4/200174-a-fistful-of-bitcoins/fulltext">A Fistful of Bitcoins: Characterizing
Payments Among Men with No Names</a>
<ul class="p"><li>Sarah Meiklejohn, Marjori Pomarole, Grant Jordan,
Kirill Levchenko, Damon McCoy, Geoffrey M. Voelker, and Stefan
Savage</li>
<li>Communications of the Association for Computing Machinery</li></ul>
</td></tr>
<tr>
<td class="a">[C : NDSS]</td>
<td class="p"><a href="files/ndss16.pdf">Centrally Banked Cryptocurrencies</a>
(<a href="files/ndss16slides.pdf">slides</a>)
<ul class="p"><li>George Danezis and Sarah Meiklejohn</li>
<li>Network and Distributed System Security Symposium</li>
<li>(This work was featured in <a
href="https://www.technologyreview.com/s/600980/a-bitcoin-style-currency-for-central-banks/">MIT
Technology Review</a>.)</li>
<li>(The source code for this project can be found <a
href="https://github.com/gdanezis/rscoin">here</a>.)</ul>
</td></tr>
</table>
</div>
<div id="2015" onclick="toggle('2015_c')"><h4>
<a href='javascript:;'>2015</a></h4></div>
<div id="2015_c">
<table>
<tr>
<td class="a">[C : PKC]</td>
<td class="p"><a href="files/pkc15.pdf">A Profitable Sub-Prime Loan: Obtaining the
Advantages of Composite Order in Prime-Order Bilinear Groups</a>
<ul class="p"><li>Allison Lewko and Sarah Meiklejohn</li>
<li>IACR International Conference on Practice and Theory of Public-Key
Cryptography</li></ul>
</td></tr>
<tr>
<td class="a">[W : BITCOIN]</td>
<td class="p"><a href="files/bitcoin15.pdf">Privacy-Enhancing Overlays in
Bitcoin</a> (<a href="files/bitcoin15-slides.pdf">slides</a>)
<ul class="p"><li>Sarah Meiklejohn and Claudio Orlandi</li>
<li>The Second Workshop on Bitcoin Research</li></ul>
</td></tr>
</table>
</div>
<div id="2014" onclick="toggle('2014_c')"><h4>
<a href='javascript:;'>2014</a></h4></div>
<div id="2014_c">
<table>
<tr>
<td class="a">[C : CCS]</td>
<td class="p"><a href="files/ccs14.pdf">Algebraic MACs and Keyed-Verification Anonymous
Credentials</a>
<ul class="p"><li>Melissa Chase, Sarah Meiklejohn, and Greg Zaverucha</li>
<li>ACM Conference on Computer and Communications Security</li></ul>
</td></tr>
<tr>
<td class="a">[J : TCAD]</td>
<td class="p"><a href="files/tcad14.pdf">Leveraging Gate-Level Properties to
Identify Hardware Timing Channels</a>
<ul class="p"><li>Jason Oberg, Sarah Meiklejohn, Timothy Sherwood, and
Ryan Kastner</li>
<li>IEEE Transactions on Computer-Aided Design of Integrated Circuits
and Systems, September 2014</li></ul>
</td></tr>
<tr>
<td class="a">[C : CSF]</td>
<td class="p"><a href="files/csf14.pdf">Malleable Signatures: New Definitions and
Delegatable Anonymous Credentials</a>
<ul class="p"><li>Melissa Chase, Markulf Kohlweiss, Anna Lysyanskaya, and
Sarah Meiklejohn</li>
<li>Computer Science Foundations Symposium</li></ul>
</td></tr>
<tr>
<td class="a">[C : Eurocrypt]</td>
<td class="p"><a href="files/eurocrypt14b.pdf">Key-Versatile Signatures and
Applications: RKA, KDM, and Joint Enc/Sig</a>
<ul class="p"><li>Mihir Bellare, Sarah Meiklejohn, and Susan Thomson</li>
<li>Eurocrypt</li></ul>
</td></tr>
<tr>
<td class="a">[C : Eurocrypt]</td>
<td class="p"><a href="files/eurocrypt14a.pdf">Déjà Q: Using Dual Systems
to Revisit q-Type Assumptions</a>
(<a href="files/eurocrypt14-slides.pdf">slides</a>)
<ul class="p"><li>Melissa Chase and Sarah Meiklejohn</li>
<li>Eurocrypt</li></ul>
</td></tr>
<tr>
<td class="a">[M : Thesis]</td>
<td class="p"><a href="files/dissertation.pdf">Flexible Models for Secure Systems</a>
(<a href="files/dissertation-slides.pdf">slides</a>)
<ul class="p"><li>UCSD Dissertation, April 2014</li>
<li>(This won UCSD's 2015 Chancellor's Dissertation Medal (see
<a href="http://www.cs.ucsd.edu/node/2761">here</a> and
<a
href="http://jacobsschoolofengineering.blogspot.co.uk/2015/05/bitcoin-experts-and-cse-alumna-wins.html">here</a>).
Thanks!)</li></ul>
</td></tr>
<tr>
<td class="a">[C : NDSS]</td>
<td class="p"><a href="files/ndss14.pdf">Botcoin: Monetizing Stolen Cycles</a>
<ul class="p"><li>Danny Yuxing Huang, Hitesh Dharmdasani, Sarah Meiklejohn, Vacha Dave,
Chris Grier, Damon McCoy, Stefan Savage, Nicholas Weaver, Alex C. Snoeren,
and Kirill Levchenko</li>
<li>Network and Distributed System Security Symposium</li></ul>
</td></tr>
<tr>
<td class="a">[C : CT-RSA]</td>
<td class="p"><a href="files/ctrsa14.pdf">Rethinking Verifiably Encrypted
Signatures: A Gap in Functionality and Potential Solutions</a>
(<a href="files/ctrsa14-slides.pdf">slides</a>)
<ul class="p"><li>Theresa Calderon, Sarah Meiklejohn, Hovav Shacham, and
Brent Waters</li>
<li>Cryptographer's Track at the RSA Conference</li></ul>
</td></tr>
</table>
</div>
<div id="2013" onclick="toggle('2013_c')"><h4>
<a href='javascript:;'>2013</a></h4></div>
<div id="2013_c">
<table>
<tr>
<td class="a">[J : login]</td>
<td class="p"><a href="files/login13.pdf">A Fistful of Bitcoins: Characterizing
Payments Among Men with No Names</a>
<ul class="p"><li>Sarah Meiklejohn, Marjori Pomarole, Grant Jordan,
Kirill Levchenko, Damon McCoy, Geoffrey M. Voelker, and Stefan Savage</li>
<li>USENIX ;login:, December 2013</li>
<li>(Se puede leer este artículo en español <a
href="https://99bitcoins.com/es/un-punado-de-bitcoins-distinguiendo-pagos-entre-hombres-sin-nombres/">aquí</a>.)</li></ul>
</td></tr>
<tr>
<td class="a">[C : IMC]</td>
<td class="p"><a href="files/imc13.pdf">A Fistful of Bitcoins: Characterizing Payments
Among Men with No Names</a>
(<a href="files/imc13-slides.pdf">slides</a>)
<ul class="p"><li>Sarah Meiklejohn, Marjori Pomarole, Grant Jordan, Kirill
Levchenko, Damon McCoy, Geoffrey M. Voelker, and Stefan Savage</li>
<li>Internet Measurement Conference</li>
<li>(This work won a Test of Time Award at IMC 2024. It was also featured in Andy Greenberg's fantastic book, <a href="https://www.penguinrandomhouse.com/books/690603/tracers-in-the-dark-by-andy-greenberg">Tracers in the Dark</a>. Thanks!)</li>
<li>(This work was featured in
<a href="http://dealbook.nytimes.com/2013/12/05/in-the-murky-world-of-bitcoin-fraud-is-quicker-than-the-law/">The New York Times</a>,
<a href="http://www.wired.com/wiredenterprise/2013/08/bitocoin_anonymity/">Wired</a>,
<a href="http://www.economist.com/blogs/babbage/2013/08/virtual-currency">The Economist</a>,
<a href="http://www.forbes.com/sites/andygreenberg/2013/09/05/follow-the-bitcoins-how-we-got-busted-buying-drugs-on-silk-roads-black-market/">Forbes</a>,
<a href="http://www.washingtonpost.com/blogs/the-switch/wp/2013/11/23/heres-who-probably-did-that-massive-150000000-bitcoin-transaction/">The Washington Post</a>,
and <a href='javascript:;' onclick="toggle('bitcoin')">more</a>.)</li>
<li><div id="bitcoin">
<ul class="b">
<li class="b"><a href="http://www.businessweek.com/articles/2013-08-27/bitcoin-may-not-be-so-anonymous-after-all">Business Week</a></li>
<li class="b"><a href="http://www.coindesk.com/researcher-tracks-bitcoin-movements-anonymity/">Coindesk</a>
(<a href="http://www.coindesk.com/following-the-money-bitcoin-black-market-purchases-anonymous/">×2</a>)</li>
<li class="b"><a href="http://www.economist.com/blogs/babbage/2013/08/virtual-currency">The Economist</a>
(<a href="http://www.economist.com/news/technology-quarterly/21590766-virtual-currency-it-mathematically-elegant-increasingly-popular-and-highly">×2</a>)</li>
<li class="b"><a href="http://www.forbes.com/sites/andygreenberg/2013/09/05/follow-the-bitcoins-how-we-got-busted-buying-drugs-on-silk-roads-black-market/">Forbes</a>
(<a href="http://www.forbes.com/sites/kashmirhill/2013/10/17/does-this-17-million-bitcoin-wallet-belong-to-alleged-silk-road-mastermind-ross-ulbricht/">×2</a>,
<a href="http://www.forbes.com/sites/andygreenberg/2013/10/25/fbi-says-its-seized-20-million-in-bitcoins-from-ross-ulbricht-alleged-owner-of-silk-road/">×3</a>)</li>
<li class="b"><a href="http://www.foreignpolicy.com/articles/2013/11/12/bitcoins_collision_course_with_washington">Foreign Policy</a>
(<a href="http://blog.foreignpolicy.com/posts/2013/11/17/bitcoin_to_congress_back_off">×2</a>)</li>
<li class="b"><a href="http://www.kpbs.org/news/2013/aug/01/how-ucsd-researcher-helped-expose-cybercrime-heroi/">KPBS</a>
(<a href="http://www.kpbs.org/news/2013/nov/29/why-some-holiday-shoppers-are-spending-bitcoin-bla/">×2</a>)</li>
<li class="b"><a href="http://krebsonsecurity.com/2013/07/mail-from-the-velvet-cybercrime-underground/">Krebs on Security</a>
(<a href="http://krebsonsecurity.com/2013/10/feds-take-down-online-fraud-bazaar-silk-road-arrest-alleged-mastermind/">×2</a>)</li>
<li class="b"><a href="http://www.technologyreview.com/news/518816/mapping-the-bitcoin-economy-could-reveal-users-identities/">MIT Technology Review</a>
(<a href="http://www.technologyreview.com/view/519846/silk-road-bust-could-slow-bitcoin-economy/">×2</a>)</li>
<li class="b"><a href="http://dealbook.nytimes.com/2013/12/05/in-the-murky-world-of-bitcoin-fraud-is-quicker-than-the-law/">The New York Times</a></li>
<li class="b"><a href="http://www.pcworld.com/article/2047608/bitcoin-offers-privacy-as-long-as-you-dont-cash-out-or-spend-it.html">PC World</a></li>
<li class="b"><a href="http://news.slashdot.org/story/13/08/28/1649207/bitcoin-perfectly-anonymous-until-you-spend-it">Slashdot</a>
(<a href="http://yro.slashdot.org/story/13/09/09/0523218/researcher-spots-a-drug-buy-in-bitcoins-blockchain">×2</a>)</li>
<li class="b"><a href="http://motherboard.vice.com/blog/bitcoin-isnt-the-criminal-safe-haven-people-think-it-is">Vice</a></li>
<li class="b"><a href="http://www.washingtonpost.com/blogs/the-switch/wp/2013/11/23/heres-who-probably-did-that-massive-150000000-bitcoin-transaction/">The Washington Post</a></li>
<li class="b"><a href="http://www.wired.com/wiredenterprise/2013/08/bitocoin_anonymity/">Wired</a>
(<a href="http://www.wired.com/wiredenterprise/2013/10/bitcoin-addres/">×2</a>,
<a href="http://www.wired.co.uk/news/archive/2013-10/21/cybercrime-dark-web">×3</a>,
<a href="http://www.wired.com/wiredenterprise/2013/12/fbi_wallet/">×4</a>)</li></ul>
</div></li>
<li>(One of two IMC papers fast-tracked for Transactions on
Networking.)</li></ul>
</td></tr>
<tr>
<td class="a">[C : DATE]</td>
<td class="p"><a href="files/date13.pdf">A Practical Testing Framework for
Isolating Hardware Timing Channels</a>
<ul class="p"><li>Jason Oberg, Sarah Meiklejohn, Timothy Sherwood, and
Ryan Kastner</li>
<li>Design, Automation, and Test in Europe</li></ul>
</td></tr>
<tr>
<td class="a">[C : TCC]</td>
<td class="p"><a href="files/tcc13.pdf">Succinct Malleable NIZKs and an Application
to Compact Shuffles</a>
(<a href="files/tcc13-slides.pdf">slides</a>)
<ul class="p"><li>Melissa Chase, Markulf Kohlweiss, Anna Lysyanskaya, and Sarah
Meiklejohn</li>
<li>Theory of Cryptography Conference</li></ul>
</td></tr>
<tr>
<td class="a">[C : PKC]</td>
<td class="p"><a href="files/pkc13.pdf">Verifiable Elections That Scale for Free</a>
(<a href="files/pkc13-slides.pdf">slides</a>)
<ul class="p"><li>Melissa Chase, Markulf Kohlweiss, Anna Lysyanskaya, and Sarah
Meiklejohn</li>
<li>International Conference on Practice and Theory of
Public-Key Cryptography</li></ul>
</td></tr>
</table>
</div>
<div id="2012" onclick="toggle('2012_c')"><h4>
<a href='javascript:;'>2012</a></h4></div>
<div id="2012_c">
<table>
<tr>
<td class="a">[C : Eurocrypt]</td>
<td class="p"><a href="files/eurocrypt12.pdf">Malleable Proof Systems and
Applications</a>
(<a href="files/eurocrypt12-slides.pdf">slides</a>)
<ul class="p"><li>Melissa Chase, Markulf Kohlweiss, Anna Lysyanskaya, and
Sarah Meiklejohn</li>
<li>Eurocrypt</li></ul>
</td></tr>
</table>
</div>
<div id="2011" onclick="toggle('2011_c')"><h4>
<a href='javascript:;'>2011</a></h4></div>
<div id="2011_c">
<table>
<tr>
<td class="a">[C : USENIX Security]</td>
<td class="p"><a href="files/usenix11.pdf">The Phantom Tollbooth: Privacy-Preserving
Electronic Toll Collection in the Presence of Driver Collusion</a>
(<a href="files/usenix11-slides.pdf">slides</a>)
<ul class="p"><li>Sarah Meiklejohn, Keaton Mowery, Stephen Checkoway, and
Hovav Shacham</li>
<li>USENIX Security Symposium</li></ul>
</td></tr>
<tr>
<td class="a">[W : WOOT]</td>
<td class="p"><a href="files/woot11.pdf">Heat of the Moment: Characterizing the
Efficacy of Thermal Camera-Based Attacks</a>
(<a href="files/woot11-slides.pdf">slides</a>)
<ul class="p"><li>Keaton Mowery, Sarah Meiklejohn, and Stefan Savage</li>
<li>USENIX Workshop on Offensive Technologies</li></ul>
</td></tr>
</table>
</div>
<div id="2010" onclick="toggle('2010_c')"><h4>
<a href='javascript:;'>2010</a></h4></div>
<div id="2010_c">
<table>
<tr>
<td class="a">[C : Asiacrypt]</td>
<td class="p"><a href="files/asiacrypt10.pdf">Limitations on Transformations from
Composite-Order to Prime-Order Groups: The Case of Round-Optimal Blind
Signatures</a>
(<a href="files/asiacrypt10-slides.pdf">slides</a>)
<ul class="p"><li>Sarah Meiklejohn, Hovav Shacham, and David Mandell
Freeman</li>
<li>Asiacrypt</li></ul>
</td></tr>
<tr>
<td class="a">[C : USENIX Security]</td>
<td class="p"><a href="files/usenix10.pdf">ZKPDL: A Language-Based System for
Efficient Zero-Knowledge Proofs and Electronic Cash</a>
(<a href="files/usenix10-slides.pdf">slides</a>)
<ul class="p"><li>Sarah Meiklejohn, C. Chris Erway, Alptekin
Küpçü, Theodora Hinkle, and Anna Lysyanskaya</li>
<li>USENIX Security Symposium</li>
<li>(The source code for this project can be found
<a href="http://www.github.com/brownie/cashlib">here</a>, and the project homepage
<a href="http://cs.brown.edu/research/brownie">here</a>.)</li></ul>
</td></tr>
</table>
</div>
<div id="2009" onclick="toggle('2009_c')"><h4>
<a href='javascript:;'>2009</a></h4></div>
<div id="2009_c">
<table>
<tr>
<td class="a">[M : Thesis]</td>
<td class="p"><a href="files/mastersthesis.pdf">An Extension of the Groth-Sahai Proof
System</a>
<ul class="p"><li>Brown University Masters thesis, May 2009</li></ul>
</td></tr>
</table>
</div>
<h2>Teaching</h2>
<ul>
<li>Spring 2019 and 2021: <a
href="https://github.com/smeiklej/comp0141_slides">Security</a></li>
<li>Spring 2019: Cryptocurrencies</li>
<li>Spring 2015 – 2018: Introduction to Cybersecurity</li>
<li>Autumn 2017: <a
href="https://github.com/smeiklej/secu2002_2017">Programming
for Crime Scientists</a></li>
</ul>
<h2>Events</h2>
<ul>
<li><a href="https://cats-workshop.github.io/">Workshop on Cryptography
Applied to Transparency Systems (CATS)</a>,
30 November 2023 (co-organizer and program chair)</li>
<li><a href="https://uk-crypto-day.github.io/2023/06/23/uk-crypto-day/">UK
Crypto Day</a>, 23 June 2023 (co-organizer)</li>
<li><a href="https://sechope23.github.io/">IEEE Workshop on Security for
Harassment Online, Protections, and Empowerment (SecHOPE)</a>,
25 May 2023 (co-organizer)</li>
<li><a
href="https://uk-crypto-day.github.io/2022/11/24/london-ish-crypto-day/">London(-ish)
Crypto Day</a>, 24 November 2022 (co-organizer)</li>
<li><a href="https://eurocrypt.iacr.org/2021/">Eurocrypt</a>,
17-21 October 2021 (invited speaker)
(<a href="files/eurocrypt21invited-slides.pdf">slides</a>)</li>
<li><a href="https://2020.ieeesb.org/">IEEE Security & Privacy on the
Blockchain (S&B)</a>, 7 September 2020 (keynote speaker)</li>
<li><a href="https://conferences.ncl.ac.uk/ssr2019/">Security Standardisation
Research Conference (SSR)</a>, 11 November 2019 (keynote speaker)</li>
<li><a href="http://deic.uab.cat/conferences/cbt/cbt2018/">International
Workshop on Cryptocurrencies and Blockchain Technology (CBT)</a>, 6-7
September 2018 (keynote speaker)</li>
<li><a href="https://summerschool-croatia.cs.ru.nl/2018/">Summer school on
real-world crypto and privacy</a>, 11-15 June 2018 (organizing committee
member)</li>
<li>London Crypto Day, 22 September 2017 (co-organizer and speaker)</li>
<li><a href="https://blockchain-summer.epfl.ch/">Swiss
Blockchain Summer School</a>, 21-24 June 2017 (speaker)</li>
<li><a
href="https://summerschool-croatia.cs.ru.nl/2017/">Summer school on
real-world crypto and privacy</a>, 5-9 June 2017 (speaker)</li>
<li><a href="http://bitcoinschool.gr">IACR Summer School on Blockchain
Technologies</a>, 30 May - 2 June 2016 (co-organizer)</li>
</ul>
<h2>Program (co-)chair</h2>
<ul>
<li> 2020: <a href="https://aft.acm.org/">AFT</a> (Advances in Financial
Technologies)</li>
<li> 2018: <a href="http://fc18.ifca.ai/">Financial Crypto</a></li>
<li> 2016: <a href="http://fc16.ifca.ai/bitcoin/">BITCOIN</a>
(Third Workshop on Bitcoin and Blockchain Research)</li>
</ul>
<h2>Associate chair</h2>
<ul>
<li> 2023: <a href="https://www.ieee-security.org/TC/SP2023/">IEEE S&P
("Oakland")</a>
<li> 2021: <a href="https://www.sigsac.org/ccs/CCS2021/">CCS</a> (chair for the Blockchain and Distributed Systems track)
</ul>
<h2>Program committee member</h2>
<ul>
<li> 2024: <a href="https://www.usenix.org/conference/usenixsecurity24">USENIX
Security</a></li>
<li> 2023: <a href="https://www.usenix.org/conference/usenixsecurity23">USENIX
Security</a>,
<a href="https://www.usenix.org/conference/atc23">USENIX ATC</a>,
<a href="https://cbr.stanford.edu/sbc23/">SBC</a>
</li>
<li> 2022: <a href="https://www.ieee-security.org/TC/SP2022/">IEEE S&P
("Oakland")</a>,
<a href="https://www.usenix.org/conference/usenixsecurity22/">USENIX
Security</a>,
<a href="https://cbr.stanford.edu/sbc22/">SBC</a>
</li>
<li> 2021: <a href="http://fc21.ifca.ai/">Financial Crypto</a>,
<a href="https://sosp2021.mpi-sws.org/index.html">SOSP</a>
</li>
<li> 2020: <a href="https://www.usenix.org/conference/usenixsecurity20">USENIX
Security</a>,
<a href="http://www.ieee-security.org/TC/EuroSP2020/index.html">EuroS&P</a>,
<a href="https://weis2020.econinfosec.org/">WEIS</a>
</li>
<li> 2019: <a href="http://www.ieee-security.org/TC/SP2019/">IEEE S&P
("Oakland")</a>, <a href="https://www.petsymposium.org">PETS</a>,
<a href="https://www.usenix.org/conference/enigma2019">Enigma</a>,
<a href="https://rwc.iacr.org/2019/">RWC</a>,
<a href="https://www.usenix.org/conference/usenixsecurity19">USENIX
Security</a>
</li>
<li>2018: <a href="https://www.petsymposium.org/">PETS</a>,
<a href="https://cryptovalleyconference.com/">Crypto Valley</a>,
<a href="https://crypto.iacr.org/2018/">Crypto</a>,
<a href="http://deic.uab.cat/conferences/cbt/cbt2018/">CBT</a>
</li>
<li>2017: <a
href="http://www.internetsociety.org/events/ndss-symposium/ndss-symposium-2017">NDSS</a>,
<a href="http://www.ieee-security.org/TC/SP2017/">IEEE S&P ("Oakland")</a>,
<a href="https://www.usenix.org/conference/usenixsecurity17">USENIX
Security</a>
</li>
<li>2016: <a href="http://ist.ac.at/eurocrypt2016/">Eurocrypt</a>,
<a href="http://fc16.ifca.ai">Financial Crypto</a>,
<a href="http://weis2016.econinfosec.org/">WEIS</a>,