Thomas Shrimpton

4.0k total citations · 1 hit paper
28 papers, 632 citations indexed

About

Thomas Shrimpton is a scholar working on Artificial Intelligence, Signal Processing and Computer Networks and Communications. According to data from OpenAlex, Thomas Shrimpton has authored 28 papers receiving a total of 632 indexed citations (citations by other indexed papers that have themselves been cited), including 21 papers in Artificial Intelligence, 12 papers in Signal Processing and 8 papers in Computer Networks and Communications. Recurrent topics in Thomas Shrimpton's work include Internet Traffic Analysis and Secure E-voting (9 papers), Advanced Malware Detection Techniques (9 papers) and Cryptography and Data Security (7 papers). Thomas Shrimpton is often cited by papers focused on Internet Traffic Analysis and Secure E-voting (9 papers), Advanced Malware Detection Techniques (9 papers) and Cryptography and Data Security (7 papers). Thomas Shrimpton collaborates with scholars based in United States and Switzerland. Thomas Shrimpton's co-authors include Kevin P. Dyer, Thomas Ristenpart, Scott E. Coull, Aditya Akella, David F. Clayton, Yevgeniy Dodis, Markus Jakobsson, Philip MacKenzie, John Black and Martijn Stam and has published in prestigious journals such as Lecture notes in computer science, Journal of Cryptology and USENIX Security Symposium.

In The Last Decade

Thomas Shrimpton

26 papers receiving 603 citations

Hit Papers

Peek-a-Boo, I Still See You: Why Efficient Traffic Analys... 2012 2026 2016 2021 2012 50 100 150 200 250

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Thomas Shrimpton United States 12 554 371 227 165 102 28 632
Juraj Somorovsky Germany 16 432 0.8× 297 0.8× 244 1.1× 382 2.3× 59 0.6× 40 735
Hartmut Liefke United States 5 252 0.5× 336 0.9× 125 0.6× 85 0.5× 47 0.5× 7 394
Mike Bond United Kingdom 8 189 0.3× 139 0.4× 109 0.5× 218 1.3× 39 0.4× 15 373
Olivier Markowitch Belgium 9 282 0.5× 183 0.5× 62 0.3× 134 0.8× 75 0.7× 29 398
J.B. Grizzard United States 11 279 0.5× 355 1.0× 243 1.1× 151 0.9× 71 0.7× 18 491
Marc Fischlin Germany 14 357 0.6× 230 0.6× 47 0.2× 226 1.4× 56 0.5× 47 482
Alok Tongaonkar United States 14 312 0.6× 383 1.0× 244 1.1× 96 0.6× 34 0.3× 24 496
Stefan Lindskog Sweden 8 194 0.4× 222 0.6× 110 0.5× 129 0.8× 27 0.3× 62 356
Germano Caronni Switzerland 11 287 0.5× 495 1.3× 68 0.3× 175 1.1× 76 0.7× 30 629
Changsha Ma United States 9 207 0.4× 429 1.2× 79 0.3× 391 2.4× 38 0.4× 12 538

Countries citing papers authored by Thomas Shrimpton

Since Specialization
Citations

This map shows the geographic impact of Thomas Shrimpton's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Thomas Shrimpton with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Thomas Shrimpton more than expected).

Fields of papers citing papers by Thomas Shrimpton

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Thomas Shrimpton. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Thomas Shrimpton. The network helps show where Thomas Shrimpton may publish in the future.

Co-authorship network of co-authors of Thomas Shrimpton

This figure shows the co-authorship network connecting the top 25 collaborators of Thomas Shrimpton. A scholar is included among the top collaborators of Thomas Shrimpton based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Thomas Shrimpton. Thomas Shrimpton is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
2.
Shrimpton, Thomas, et al.. (2023). Compact Frequency Estimators in Adversarial Environments. Repository for Publications and Research Data (ETH Zurich). 3254–3268.
3.
Dodis, Yevgeniy & Thomas Shrimpton. (2022). Advances in Cryptology – CRYPTO 2022. Lecture notes in computer science. 2 indexed citations
4.
Dodis, Yevgeniy & Thomas Shrimpton. (2022). Advances in Cryptology – CRYPTO 2022. Lecture notes in computer science. 1 indexed citations
5.
Shrimpton, Thomas, et al.. (2022). SMS OTP Security (SOS). 2–16. 8 indexed citations
6.
Dodis, Yevgeniy & Thomas Shrimpton. (2022). Advances in Cryptology – CRYPTO 2022. Lecture notes in computer science. 15 indexed citations
7.
Shrimpton, Thomas, et al.. (2018). Partially Specified Channels. 1415–1428. 5 indexed citations
8.
Butler, Kevin, et al.. (2018). Mitigating Risk while Complying with Data Retention Laws. 2011–2027. 6 indexed citations
9.
Reaves, Bradley, et al.. (2017). Authenticall: efficient identity and content authentication for phone calls. USENIX Security Symposium. 575–592. 17 indexed citations
10.
Nahiyan, Adib, et al.. (2017). Standardizing Bad Cryptographic Practice. 1533–1546. 11 indexed citations
11.
Dyer, Kevin P., Scott E. Coull, & Thomas Shrimpton. (2015). Marionette: a programmable network-traffic obfuscation system. USENIX Security Symposium. 367–382. 22 indexed citations
12.
Dyer, Kevin P., et al.. (2015). Seeing through Network-Protocol Obfuscation. 57–69. 64 indexed citations
13.
Luchaup, Daniel, Kevin P. Dyer, Somesh Jha, Thomas Ristenpart, & Thomas Shrimpton. (2014). LibFTE: a toolkit for constructing practical, format-abiding encryption schemes. USENIX Security Symposium. 877–891. 12 indexed citations
14.
Dyer, Kevin P., Scott E. Coull, Thomas Ristenpart, & Thomas Shrimpton. (2013). Protocol misidentification made easy with format-transforming encryption. 61–72. 68 indexed citations
15.
Dyer, Kevin P., Scott E. Coull, Thomas Ristenpart, & Thomas Shrimpton. (2012). Peek-a-Boo, I Still See You: Why Efficient Traffic Analysis Countermeasures Fail. 332–346. 289 indexed citations breakdown →
16.
Black, John, et al.. (2008). On the Impossibility of Highly-Efficient Blockcipher-Based Hash Functions. Journal of Cryptology. 22(3). 311–329. 2 indexed citations
17.
Shrimpton, Thomas & Martijn Stam. (2008). Building a Collision-Resistant Compression Function from Non-compressing Primitives (Extended Abstract). 1 indexed citations
18.
Andreeva, Elena, Gregory Neven, Bart Preneel, & Thomas Shrimpton. (2007). Seven-Property-Preserving Iterated Hashing: ROX. Lecture notes in computer science. 2007. 130–146. 16 indexed citations
19.
MacKenzie, Philip, Thomas Shrimpton, & Markus Jakobsson. (2005). Threshold Password-Authenticated Key Exchange. Journal of Cryptology. 19(1). 27–66. 23 indexed citations
20.
Shrimpton, Thomas, et al.. (1977). CONTAINER TERMINALS-THE RELATIONSHIP BETWEEN DWELL TIME AND THROUGHPUT. 1 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026