Thomas Ristenpart

17.0k total citations · 8 hit papers
75 papers, 7.5k citations indexed

About

Thomas Ristenpart is a scholar working on Artificial Intelligence, Information Systems and Signal Processing. According to data from OpenAlex, Thomas Ristenpart has authored 75 papers receiving a total of 7.5k indexed citations (citations by other indexed papers that have themselves been cited), including 44 papers in Artificial Intelligence, 30 papers in Information Systems and 25 papers in Signal Processing. Recurrent topics in Thomas Ristenpart's work include Advanced Malware Detection Techniques (25 papers), Security and Verification in Computing (21 papers) and Internet Traffic Analysis and Secure E-voting (12 papers). Thomas Ristenpart is often cited by papers focused on Advanced Malware Detection Techniques (25 papers), Security and Verification in Computing (21 papers) and Internet Traffic Analysis and Secure E-voting (12 papers). Thomas Ristenpart collaborates with scholars based in United States, United Kingdom and Switzerland. Thomas Ristenpart's co-authors include Somesh Jha, Matt Fredrikson, Stefan Savage, Hovav Shacham, Eran Tromer, Yinqian Zhang, Ari Juels, Michael K. Reiter, Paul Grubbs and Michael M. Swift and has published in prestigious journals such as Proceedings of the VLDB Endowment, Lecture notes in computer science and IEEE Security & Privacy.

In The Last Decade

Thomas Ristenpart

74 papers receiving 7.2k citations

Hit Papers

Model Inversion Attacks that Exploit Confidence Informat... 2009 2026 2014 2020 2015 2009 2012 2015 2014 500 1000 1.5k

Peers

Thomas Ristenpart
Aviel D. Rubin United States
Vitaly Shmatikov United States
Bruce Schneier United States
David Wagner United States
Steven M. Bellovin United States
Lujo Bauer United States
N. Asokan Finland
Ross Anderson United Kingdom
Thomas Ristenpart
Citations per year, relative to Thomas Ristenpart Thomas Ristenpart (= 1×) peers Paul C. van Oorschot

Countries citing papers authored by Thomas Ristenpart

Since Specialization
Citations

This map shows the geographic impact of Thomas Ristenpart's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Thomas Ristenpart with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Thomas Ristenpart more than expected).

Fields of papers citing papers by Thomas Ristenpart

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Thomas Ristenpart. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Thomas Ristenpart. The network helps show where Thomas Ristenpart may publish in the future.

Co-authorship network of co-authors of Thomas Ristenpart

This figure shows the co-authorship network connecting the top 25 collaborators of Thomas Ristenpart. A scholar is included among the top collaborators of Thomas Ristenpart based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Thomas Ristenpart. Thomas Ristenpart is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
2.
Tseng, Emily, Thomas Ristenpart, & Nicola Dell. (2025). Mitigating Trauma in Qualitative Research Infrastructure: Roles for Machine Assistance and Trauma-Informed Design. Proceedings of the ACM on Human-Computer Interaction. 9(2). 1–37. 1 indexed citations
3.
Tseng, Emily, et al.. (2024). Data Stewardship in Clinical Computer Security: Balancing Benefit and Burden in Participatory Systems. Proceedings of the ACM on Human-Computer Interaction. 8(CSCW1). 1–29. 3 indexed citations
4.
Bellini, Rosanna, Emily Tseng, Tara Matthews, et al.. (2024). SoK: Safer Digital-Safety Research Involving At-Risk Users. 635–654. 10 indexed citations
5.
Nassi, Ben, et al.. (2024). Injection Attacks Against End-to-End Encrypted Applications. 2648–2665. 2 indexed citations
6.
Xu, Min, et al.. (2021). Searching Encrypted Data with Size-Locked Indexes. USENIX Security Symposium. 4025–4042. 1 indexed citations
7.
Grubbs, Paul, Anurag Khandelwal, Marie-Sarah Lacharité, et al.. (2020). PANCAKE: Frequency Smoothing for Encrypted Data Stores.. IACR Cryptology ePrint Archive. 2020. 1501–2468. 6 indexed citations
8.
Tseng, Emily, Rosanna Bellini, Nora McDonald, et al.. (2020). The Tools and Tactics Used in Intimate Partner Surveillance: An Analysis of Online Infidelity Forums. arXiv (Cornell University). 1893–1909. 14 indexed citations
9.
Freed, Diana, et al.. (2019). Clinical computer security for victims of intimate partner violence. USENIX Security Symposium. 105–122. 25 indexed citations
10.
Ristenpart, Thomas, et al.. (2018). BurnBox: Self-Revocable Encryption in a World Of Compelled Access. IACR Cryptology ePrint Archive. 2018. 445–461. 4 indexed citations
11.
Chatterjee, Rahul, Joseph Bonneau, Ari Juels, & Thomas Ristenpart. (2015). Cracking-Resistant Password Vaults Using Natural Language Encoders. 481–498. 35 indexed citations
12.
Chatterjee, Rahul, et al.. (2015). The Pythia PRF Service.. IACR Cryptology ePrint Archive. 2015. 547–562. 21 indexed citations
13.
Zhai, Yan, et al.. (2014). A day late and a dollar short: the case for research on cloud billing systems. IEEE International Conference on Cloud Computing Technology and Science. 21–21. 7 indexed citations
14.
Varadarajan, Venkatanathan, Thomas Ristenpart, & Michael M. Swift. (2014). Scheduler-based defenses against cross-VM side-channels. USENIX Security Symposium. 687–702. 82 indexed citations
15.
Luchaup, Daniel, Kevin P. Dyer, Somesh Jha, Thomas Ristenpart, & Thomas Shrimpton. (2014). LibFTE: a toolkit for constructing practical, format-abiding encryption schemes. USENIX Security Symposium. 877–891. 12 indexed citations
16.
Zhai, Yan, et al.. (2014). Not-So-Random Numbers in Virtualized Linux and the Whirlwind RNG. 559–574. 19 indexed citations
17.
Bellare, Mihir, Sriram Keelveedhi, & Thomas Ristenpart. (2013). DupLESS: Server-Aided Encryption for Deduplicated Storage.. IACR Cryptology ePrint Archive. 2013. 179–194. 257 indexed citations breakdown →
18.
Davidson, Drew, et al.. (2013). FIE on firmware: finding vulnerabilities in embedded systems using symbolic execution. USENIX Security Symposium. 463–478. 89 indexed citations
19.
Recht, Benjamin, et al.. (2012). Security analysis of smartphone point-of-sale systems. 3–3. 11 indexed citations
20.
Cachin, Christian & Thomas Ristenpart. (2011). Proceedings of the 3rd ACM workshop on Cloud computing security workshop. 13 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026