Activities

2024

  • Re-Imagining Cryptography and Privacy (ReCAP) Workshop
    Alishah Chator, Seny Kamara, Lucy Qin, and Leah Namisa Rosenbloom
    Workshop: Boston University, May 2-3
    [info]

2023

  • Digital Security for Lawyers & Clients
    Glencora Borradaile and Leah Namisa Rosenbloom
    Workshop: Public Interest Environmental Law Conference 2023
    [activity]

  • Cryptography for Grassroots Organizing
    Seny Kamara and Leah Namisa Rosenbloom
    Talk: Real World Cryptography 2023
    [slides] [talk]

  • Cryptography, the Internet, and Grassroots Organizing
    Seny Kamara and Leah Namisa Rosenbloom
    Invited Talk: Human Rights Protocol Considerations Session at IETF 116
    [slides] [talk]

  • Where Do Threat Models Come From? Challenging Implicit Assumptions
    Lucy Qin, Leah Namisa Rosenbloom, and Kris Shrishak
    Talk: HotPETs 2023
    [slides]

  • Cryptography from Roots to Fruits
    Seny Kamara and Leah Namisa Rosenbloom
    Invited Talk: Advanced School of Cryptography at Latincrypt 2023
    Activity: Brown University
    [slides][activity]

  • Sometimes You Can't Distribute Random-Oracle-Based Proofs
    Jack Doerner, Yashvanth Kondi, and Leah Namisa Rosenbloom
    Publication: Under Submission
    [preprint]

  • Universal Composability and UC NIZKPoK from Σ-protocols
    Anna Lysyanskaya and Leah Namisa Rosenbloom
    Invited Lecture: Brown University (CSCI 2590)

  • Zooey Zephyr's Story: Decorum as a Tool of Oppression
    Leah Namisa Rosenbloom
    Publication: Blog Post
    [blog post]

2022

  • A Living Framework for Abolitionist Teaching in Computer Science
    Leah Namisa Rosenbloom
    Publication: CompEd 2023

  • Efficient and Universally Composable Non-Interactive Zero-Knowledge Proofs of Knowledge with Security Against Adaptive Corruptions
    Anna Lysyanskaya and Leah Namisa Rosenbloom
    Publication: Under Submission
    [preprint]

  • Universally Composable Σ-protocols in the Global Random-Oracle Model
    Anna Lysyanskaya and Leah Namisa Rosenbloom
    Invited Talks: Brown University, Northeastern University
    Publication: TCC 2022
    [paper] [slides]

  • Stickers on Webcams, Or: A Cryptographer's Origin Story
    Leah Namisa Rosenbloom
    Publication: Blog Post
    [blog post]

  • Election Security
    Leah Namisa Rosenbloom
    Invited Lecture: Brown University (CSCI 1040)

  • Cryptography Policy
    Leah Namisa Rosenbloom
    Invited Lecture: Brown University (CSCI 1040)

  • Endless Forms Most Deceitful
    William Fleischman, Nick Langan, and Leah Namisa Rosenbloom
    Publication: ETHICOMP 2022

  • Abolitionist Technology Ethics (extended abstract)
    William Fleischman and Leah Namisa Rosenbloom
    Publication: ETHICOMP 2022

2021

2020

  • Documenting Surveillance at Black Lives Matter Protests in Philadelphia
    Leah Namisa Rosenbloom
    Publication: Blog Post
    [blog post]

  • Activists Want Better, Safer Technology
    Leah Namisa Rosenbloom
    Publication: Workshop for Inclusive Privacy and Security (WIPS) 2020
    [paper] [slides]

  • rance: Memorable Keys and Passwords
    Leah Namisa Rosenbloom
    Publication: Workshop for Inclusive Privacy and Security (WIPS) 2020
    [code] [paper] [slides]

  • Philly public school teacher: School District’s laptop plans are too little, too late
    Leah Namisa Rosenbloom
    Publication: The Philadelphia Inquirer
    [article] [blog post]

  • AI and Mass Incarceration
    Leah Namisa Rosenbloom
    Publication: ETHICOMP 2020
    [paper] [slides]

  • Problems with Problematic Speech on Social Media
    William Fleischman and Leah Namisa Rosenbloom
    Publication: ETHICOMP 2020

2019

  • Manga and Graphic Novel Workshop for Highschool Students
    Leah Namisa Rosenbloom
    Workshop: The Workshop School
    [syllabus]

2018

  • Election Security
    Leah Namisa Rosenbloom
    Invited Lecture: Brown University (CSCI 1660)
    [slides]

  • Robust Anonymity in the Active Setting
    Leah Namisa Rosenbloom
    Master's Thesis: Brown University

2017

  • Transparency is Solution to Lack of Security for US Voting Systems
    Leah Namisa Rosenbloom
    Publication: American Civil Liberties Union (ACLU) Speech, Privacy, and Technology Project
    [article]

  • dheluks: a protocol to secure the remote transfer of a LUKS disk encryption password
    Leah Namisa Rosenbloom
    Implementation: ACLU Speech, Privacy, and Technology Project
    [code]

  • Election Security Workshop
    Anna Lysyanskaya and Leah Namisa Rosenbloom
    Workshop: Brown University
    [activity]