Daniel Genkin

According to our database1, Daniel Genkin authored at least 41 papers between 2010 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepages:

On csauthors.net:

Bibliography

2019
Breaking Virtual Memory Protection and the SGX Ecosystem with Foreshadow.
IEEE Micro, 2019

2018
Spectre Attacks: Exploiting Speculative Execution.
meltdownattack.com, 2018

Meltdown
meltdownattack.com, 2018

CacheQuote: Efficiently Recovering Long-term Secrets of SGX EPID via Cache Attacks.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2018

The 9 Lives of Bleichenbacher's CAT: New Cache ATtacks on TLS Implementations.
IACR Cryptology ePrint Archive, 2018

Privacy in decentralized cryptocurrencies.
Commun. ACM, 2018

Meltdown: Reading Kernel Memory from User Space.
Proceedings of the 27th USENIX Security Symposium, 2018

Foreshadow: Extracting the Keys to the Intel SGX Kingdom with Transient Out-of-Order Execution.
Proceedings of the 27th USENIX Security Symposium, 2018

vRAM: Faster Verifiable RAM with Program-Independent Preprocessing.
Proceedings of the 2018 IEEE Symposium on Security and Privacy, 2018

Another Flip in the Wall of Rowhammer Defenses.
Proceedings of the 2018 IEEE Symposium on Security and Privacy, 2018

Closure Under Reversal of Languages over Infinite Alphabets.
Proceedings of the Computer Science - Theory and Applications, 2018

Fast Large-Scale Honest-Majority MPC for Malicious Adversaries.
Proceedings of the Advances in Cryptology - CRYPTO 2018, 2018

Drive-By Key-Extraction Cache Attacks from Portable Code.
Proceedings of the Applied Cryptography and Network Security, 2018

Best of Both Worlds in Secure Computation, with Low Communication Overhead.
Proceedings of the Applied Cryptography and Network Security, 2018

2017
Acoustic Cryptanalysis.
J. Cryptology, 2017

A Zero-Knowledge Version of vSQL.
IACR Cryptology ePrint Archive, 2017

USB Snooping Made Easy: Crosstalk Leakage Attacks on USB Hubs.
Proceedings of the 26th USENIX Security Symposium, 2017

How to Construct a Leakage-Resilient (Stateless) Trusted Party.
Proceedings of the Theory of Cryptography - 15th International Conference, 2017

vSQL: Verifying Arbitrary SQL Queries over Dynamic Outsourced Databases.
Proceedings of the 2017 IEEE Symposium on Security and Privacy, 2017

Computational Integrity with a Public Random String from Quasi-Linear PCPs.
Proceedings of the Advances in Cryptology - EUROCRYPT 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30, 2017

Sliding Right into Disaster: Left-to-Right Sliding Windows Leak.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2017, 2017

May the Fourth Be With You: A Microarchitectural Side Channel Attack on Several Real-World Applications of Curve25519.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, CCS 2017, Dallas, TX, USA, October 30, 2017

2016
Physical key extraction attacks on PCs.
Commun. ACM, 2016

Binary AMD Circuits from Secure Multiparty Computation.
Proceedings of the Theory of Cryptography - 14th International Conference, 2016

ECDH Key-Extraction via Low-Bandwidth Electromagnetic Attacks on PCs.
Proceedings of the Topics in Cryptology - CT-RSA 2016 - The Cryptographers' Track at the RSA Conference 2016, San Francisco, CA, USA, February 29, 2016

CacheBleed: A Timing Attack on OpenSSL Constant Time RSA.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2016, 2016

ECDSA Key Extraction from Mobile Devices via Nonintrusive Physical Side Channels.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

2015
Get your hands off my laptop: physical side-channel key-extraction attacks on PCs - Extended version.
J. Cryptographic Engineering, 2015

Efficient Multi-party Computation: From Passive to Active Security via Secure SIMD Circuits.
Proceedings of the Advances in Cryptology - CRYPTO 2015, 2015

Stealing Keys from PCs Using a Radio: Cheap Electromagnetic Attacks on Windowed Exponentiation.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2015, 2015

2014
A note on the emptiness problem for alternating finite-memory automata.
Theor. Comput. Sci., 2014

Circuits resilient to additive attacks with applications to secure computation.
Proceedings of the Symposium on Theory of Computing, 2014

RSA Key Extraction via Low-Bandwidth Acoustic Cryptanalysis.
Proceedings of the Advances in Cryptology - CRYPTO 2014, 2014

Get Your Hands Off My Laptop: Physical Side-Channel Key-Extraction Attacks on PCs.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2014, 2014

2013
On the concrete efficiency of probabilistically-checkable proofs.
Proceedings of the Symposium on Theory of Computing Conference, 2013

Fast reductions from RAMs to delegatable succinct constraint satisfaction problems: extended abstract.
Proceedings of the Innovations in Theoretical Computer Science, 2013

SNARKs for C: Verifying Program Executions Succinctly and in Zero Knowledge.
Proceedings of the Advances in Cryptology - CRYPTO 2013, 2013

2012
Fast Reductions from RAMs to Delegatable Succinct Constraint Satisfaction Problems.
IACR Cryptology ePrint Archive, 2012

On the Concrete-Efficiency Threshold of Probabilistically-Checkable Proofs.
Electronic Colloquium on Computational Complexity (ECCC), 2012

2010
Extending Free Pregroups with Lower Bounds.
Studia Logica, 2010

Mildly Context-Sensitive Languages via Buffer Augmented Pregroup Grammars.
Proceedings of the Time for Verification, 2010


  Loading...