Jeremiah Blocki

1.6k total citations
29 papers, 507 citations indexed

About

Jeremiah Blocki is a scholar working on Artificial Intelligence, Information Systems and Signal Processing. According to data from OpenAlex, Jeremiah Blocki has authored 29 papers receiving a total of 507 indexed citations (citations by other indexed papers that have themselves been cited), including 13 papers in Artificial Intelligence, 12 papers in Information Systems and 10 papers in Signal Processing. Recurrent topics in Jeremiah Blocki's work include User Authentication and Security Systems (11 papers), Cryptography and Data Security (10 papers) and Advanced Malware Detection Techniques (10 papers). Jeremiah Blocki is often cited by papers focused on User Authentication and Security Systems (11 papers), Cryptography and Data Security (10 papers) and Advanced Malware Detection Techniques (10 papers). Jeremiah Blocki collaborates with scholars based in United States, Austria and Canada. Jeremiah Blocki's co-authors include Anupam Datta, Or Sheffet, Avrim Blum, Ninghui Li, Tianhao Wang, Somesh Jha, Samson Zhou, Joël Alwen, Joseph Bonneau and Ariel D. Procaccia and has published in prestigious journals such as IEEE Transactions on Information Theory, Information and Computation and Journal of Cryptology.

In The Last Decade

Jeremiah Blocki

28 papers receiving 487 citations

Peers

Jeremiah Blocki
Russell Paulet Australia
Bharath K. Samanthula United States
Geetha Jagannathan United States
Baoxu Shi United States
Alessandro Epasto United States
Russell Paulet Australia
Jeremiah Blocki
Citations per year, relative to Jeremiah Blocki Jeremiah Blocki (= 1×) peers Russell Paulet

Countries citing papers authored by Jeremiah Blocki

Since Specialization
Citations

This map shows the geographic impact of Jeremiah Blocki's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Jeremiah Blocki with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Jeremiah Blocki more than expected).

Fields of papers citing papers by Jeremiah Blocki

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Jeremiah Blocki. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Jeremiah Blocki. The network helps show where Jeremiah Blocki may publish in the future.

Co-authorship network of co-authors of Jeremiah Blocki

This figure shows the co-authorship network connecting the top 25 collaborators of Jeremiah Blocki. A scholar is included among the top collaborators of Jeremiah Blocki based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Jeremiah Blocki. Jeremiah Blocki is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
Blocki, Jeremiah & Zuopeng Zhang. (2025). Amortized Locally Decodable Codes. 1–6. 1 indexed citations
2.
Blocki, Jeremiah, Peiyuan Liu, Ling Ren, & Samson Zhou. (2024). Bandwidth-Hard Functions: Reductions and Lower Bounds. Journal of Cryptology. 37(2).
3.
Blocki, Jeremiah, et al.. (2024). Cost-asymmetric memory hard password hashing. Information and Computation. 297. 105134–105134. 3 indexed citations
4.
Liu, Peiyuan, et al.. (2023). Confident Monte Carlo: Rigorous Analysis of Guessing Curves for Probabilistic Password Models. 626–644. 1 indexed citations
5.
Blocki, Jeremiah & Peiyuan Liu. (2023). Towards a Rigorous Statistical Analysis of Empirical Password Datasets. 606–625. 1 indexed citations
6.
Wang, Fei, Benjamin Delaware, Roopsha Samanta, et al.. (2021). HACCLE: metaprogramming for secure multi-party computation. 130–143. 5 indexed citations
7.
Blocki, Jeremiah, et al.. (2021). Private and Resource-Bounded Locally Decodable Codes for Insertions and Deletions. arXiv (Cornell University). 1841–1846. 5 indexed citations
8.
Blocki, Jeremiah, et al.. (2021). Relaxed Locally Correctable Codes in Computationally Bounded Channels. IEEE Transactions on Information Theory. 67(7). 4338–4360. 4 indexed citations
9.
Blocki, Jeremiah, Nicolas Christin, Anupam Datta, Ariel D. Procaccia, & Arunesh Sinha. (2018). Audit Games (CMU-CyLab-13-004). Research Showcase @ Carnegie Mellon University (Carnegie Mellon University). 1 indexed citations
10.
Blocki, Jeremiah, et al.. (2018). Just In Time Hashing. 3621. 368–383. 1 indexed citations
11.
Blocki, Jeremiah, et al.. (2018). On the Economics of Offline Password Cracking. 853–871. 33 indexed citations
12.
Blocki, Jeremiah, Ling Ren, & Samson Zhou. (2018). Bandwidth-Hard Functions. 1820–1836. 4 indexed citations
13.
Wang, Tianhao, Jeremiah Blocki, Ninghui Li, & Somesh Jha. (2017). Locally Differentially Private Protocols for Frequency Estimation. USENIX Security Symposium. 729–745. 162 indexed citations
14.
Alwen, Joël & Jeremiah Blocki. (2017). Towards Practical Attacks on Argon2i and Balloon Hashing. 142–157. 13 indexed citations
15.
Alwen, Joël, et al.. (2017). Practical Graphs for Optimal Side-Channel Resistant Memory-Hard Functions. Zenodo (CERN European Organization for Nuclear Research). 1001–1017. 12 indexed citations
16.
Blocki, Jeremiah, Nicolas Christin, Anupam Datta, Ariel D. Procaccia, & Arunesh Sinha. (2015). Audit Games with Multiple Defender Resources. Proceedings of the AAAI Conference on Artificial Intelligence. 29(1). 12 indexed citations
17.
Blocki, Jeremiah, Nicolas Christin, Anupam Datta, Ariel D. Procaccia, & Arunesh Sinha. (2013). Audit games. International Joint Conference on Artificial Intelligence. 41–47. 8 indexed citations
18.
Blocki, Jeremiah, Avrim Blum, Anupam Datta, & Or Sheffet. (2013). Differentially private data analysis of social networks via restricted sensitivity. 87–96. 102 indexed citations
19.
Blocki, Jeremiah, Avrim Blum, Anupam Datta, & Or Sheffet. (2012). The Johnson-Lindenstrauss Transform Itself Preserves Differential Privacy. 410–419. 69 indexed citations
20.
Blocki, Jeremiah, Nicolas Christin, Anupam Datta, & Arunesh Sinha. (2011). Audit mechanisms for privacy protection in healthcare environments. 10–10. 2 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026