Eran Tromer
Eran Tromer
Tel Aviv University + Columbia University
Bestätigte E-Mail-Adresse bei cs.tau.ac.il - Startseite
Titel
Zitiert von
Zitiert von
Jahr
Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds
T Ristenpart, E Tromer, H Shacham, S Savage
ACM conference on Computer and Communications Security (CCS), 199-212, 2009
23982009
Cache attacks and countermeasures: the case of AES
DA Osvik, A Shamir, E Tromer
CT-RSA 2006, 1-20, 2006
11762006
Zerocash: Decentralized anonymous payments from Bitcoin
EB Sasson, A Chiesa, C Garman, M Green, I Miers, E Tromer, M Virza
IEEE Symposium on Security and Privacy (SP) 2014, 459-474, 2014
10512014
On-the-fly multiparty computation on the cloud via multikey fully homomorphic encryption
A López-Alt, E Tromer, V Vaikuntanathan
ACM symposium on Theory of Computing (STOC) 2012, 1219-1234, 2012
6952012
RSA Key Extraction via Low-Bandwidth Acoustic Cryptanalysis.
D Genkin, A Shamir, E Tromer
CRYPTO 2014 1, 444-461, 2014
4212014
SNARKs for C: Verifying program executions succinctly and in zero knowledge
E Ben-Sasson, A Chiesa, D Genkin, E Tromer, M Virza
CRYPTO 2013, 90-108, 2013
4132013
Efficient cache attacks on AES, and countermeasures
E Tromer, DA Osvik, A Shamir
Journal of Cryptology 23 (1), 37-71, 2010
4042010
Succinct non-interactive zero knowledge for a von Neumann architecture
E Ben-Sasson, A Chiesa, E Tromer, M Virza
23rd {USENIX} Security Symposium ({USENIX} Security 14), 781-796, 2014
3372014
From extractable collision resistance to succinct non-interactive arguments of knowledge, and back again
N Bitansky, R Canetti, A Chiesa, E Tromer
Innovations in Theoretical Computer Science Conference (ITCS) 2012, 326-349, 2012
2972012
Multiparty computation with low communication, computation and interaction via threshold FHE
G Asharov, A Jain, A López-Alt, E Tromer, V Vaikuntanathan, D Wichs
Eurocrypt 2012, 483-501, 2012
2872012
Recursive composition and bootstrapping for SNARKs and proof-carrying data
N Bitansky, R Canetti, A Chiesa, E Tromer
ACM symposium on Theory of computing (STOC) 2013, 111-120, 2013
2012013
Factoring large numbers with the TWIRL device
A Shamir, E Tromer
CRYPTO 2003, 1-26, 2003
1672003
Scalable zero knowledge via cycles of elliptic curves
E Ben-Sasson, A Chiesa, E Tromer, M Virza
CRYPTO 2014 2, 276-294, 2014
1572014
Get your hands off my laptop: Physical side-channel key-extraction attacks on PCs (extended version)
D Genkin, I Pipman, E Tromer
Journal of Cryptographic Engineering 5 (2), 95-112, 2015
1492015
Get your hands off my laptop: Physical side-channel key-extraction attacks on PCs
D Genkin, I Pipman, E Tromer
Cryptographic Hardware and Embedded Systems (CHES) 2014, 242-260, 2014
1492014
Protecting circuits from leakage: the computationally-bounded and noisy cases
S Faust, T Rabin, L Reyzin, E Tromer, V Vaikuntanathan
Annual International Conference on the Theory and Applications of …, 2010
1492010
True random number generators secure in a changing environment
B Barak, R Shaltiel, E Tromer
Cryptographic hardware and embedded systems (CHES) 2003, 166-180, 2003
1422003
Stealing Keys from PCs using a Radio: Cheap Electromagnetic Attacks on Windowed Exponentiation
D Genkin, L Pachmanov, I Pipman, E Tromer
Workshop on Cryptographic Hardware and Embedded Systems (CHES) 2015, 207-228, 2015
1362015
Acoustic cryptanalysis: on nosy people and noisy machines
A Shamir, E Tromer
Online at http://people. csail. mit. edu/tromer/acoustic, 2004
1262004
ECDSA key extraction from mobile devices via nonintrusive physical side channels
D Genkin, L Pachmanov, I Pipman, E Tromer, Y Yarom
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
1212016
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20