Eran Tromer

Orcid: 0000-0002-8884-9564

Affiliations:
  • Columbia University, New York, NY, USA
  • Weizmann Institute of Science, Israel (former)


According to our database1, Eran Tromer authored at least 77 papers between 2002 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
PerfOMR: Oblivious Message Retrieval with Reduced Communication and Computation.
IACR Cryptol. ePrint Arch., 2024

DoS-resistant Oblivious Message Retrieval from Snake-eye Resistant PKE.
IACR Cryptol. ePrint Arch., 2024

2023
Optical Cryptanalysis: Recovering Cryptographic Keys from Power LED Light Fluctuations.
IACR Cryptol. ePrint Arch., 2023

ZKSMT: A VM for Proving SMT Theorems in Zero Knowledge.
IACR Cryptol. ePrint Arch., 2023

Group Oblivious Message Retrieval.
IACR Cryptol. ePrint Arch., 2023

Squint Hard Enough: Attacking Perceptual Hashing with Adversarial Machine Learning.
Proceedings of the 32nd USENIX Security Symposium, 2023

Cheesecloth: Zero-Knowledge Proofs of Real World Vulnerabilities.
Proceedings of the 32nd USENIX Security Symposium, 2023

Optical Cryptanalysis: Recovering Cryptographic Keys from Power LED Light Fluctuations.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

2022
Toward Proactive Support for Older Adults: Predicting the Right Moment for Providing Mobile Safety Help.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2022

Proving UNSAT in Zero Knowledge.
IACR Cryptol. ePrint Arch., 2022

Unclonable Polymers and Their Cryptographic Applications.
IACR Cryptol. ePrint Arch., 2022

Lend Me Your Ear: Passive Remote Physical Side Channels on PCs.
Proceedings of the 31st USENIX Security Symposium, 2022

Formalizing Human Ingenuity: A Quantitative Framework for Copyright Law's Substantial Similarity.
Proceedings of the 2022 Symposium on Computer Science and Law, 2022

Oblivious Message Retrieval.
Proceedings of the Advances in Cryptology - CRYPTO 2022, 2022

2021
Gage MPC: Bypassing Residual Function Leakage for Non-Interactive MPC.
Proc. Priv. Enhancing Technol., 2021

Plumo: An Ultralight Blockchain Client.
IACR Cryptol. ePrint Arch., 2021

Squint Hard Enough: Evaluating Perceptual Hashing with Machine Learning.
IACR Cryptol. ePrint Arch., 2021

Oblivious Messsage Retrieval.
IACR Cryptol. ePrint Arch., 2021

You Autocomplete Me: Poisoning Vulnerabilities in Neural Code Completion.
Proceedings of the 30th USENIX Security Symposium, 2021

2019
Synesthesia: Detecting Screen Content via Remote Acoustic Side Channels.
Proceedings of the 2019 IEEE Symposium on Security and Privacy, 2019

2018
Drive-by Key-Extraction Cache Attacks from Portable Code.
IACR Cryptol. ePrint Arch., 2018

Situational Access Control in the Internet of Things.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

2017
Multikey Fully Homomorphic Encryption and Applications.
SIAM J. Comput., 2017

Acoustic Cryptanalysis.
J. Cryptol., 2017

The Hunting of the SNARK.
J. Cryptol., 2017

Scalable Zero Knowledge Via Cycles of Elliptic Curves.
Algorithmica, 2017

Beauty and the Burst: Remote Identification of Encrypted Video Streams.
Proceedings of the 26th USENIX Security Symposium, 2017

2016
ECDSA Key Extraction from Mobile Devices via Nonintrusive Physical Side Channels.
IACR Cryptol. ePrint Arch., 2016

ECDH Key-Extraction via Low-Bandwidth Electromagnetic Attacks on PCs.
IACR Cryptol. ePrint Arch., 2016

Computational integrity with a public random string from quasi-linear PCPs.
IACR Cryptol. ePrint Arch., 2016

Physical key extraction attacks on PCs.
Commun. ACM, 2016

PhotoProof: Cryptographic Image Authentication for Any Set of Permissible Transformations.
Proceedings of the IEEE Symposium on Security and Privacy, 2016

Fast Multiplication in Binary Fields on GPUs via Register Cache.
Proceedings of the 2016 International Conference on Supercomputing, 2016

DroidDisintegrator: Intra-Application Information Flow Control in Android Apps.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

2015
Path-Quality Monitoring in the Presence of Adversaries: The Secure Sketch Protocols.
IEEE/ACM Trans. Netw., 2015

Get your hands off my laptop: physical side-channel key-extraction attacks on PCs - Extended version.
J. Cryptogr. Eng., 2015

Stealing Keys from PCs using a Radio: Cheap Electromagnetic Attacks on Windowed Exponentiation.
IACR Cryptol. ePrint Arch., 2015

Circuits Resilient to Additive Attacks with Applications to Secure Computation.
IACR Cryptol. ePrint Arch., 2015

Cluster Computing in Zero Knowledge.
IACR Cryptol. ePrint Arch., 2015

Secure Association for the Internet of Things.
IACR Cryptol. ePrint Arch., 2015

Secure Sampling of Public Parameters for Succinct Zero Knowledge Proofs.
Proceedings of the 2015 IEEE Symposium on Security and Privacy, 2015

2014
Protecting Circuits from Computationally Bounded and Noisy Leakage.
SIAM J. Comput., 2014

Get Your Hands Off My Laptop: Physical Side-Channel Key-Extraction Attacks on PCs.
IACR Cryptol. ePrint Arch., 2014

Zerocash: Decentralized Anonymous Payments from Bitcoin.
IACR Cryptol. ePrint Arch., 2014

Succinct Non-Interactive Zero Knowledge for a von Neumann Architecture.
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014

2013
On-the-Fly Multiparty Computation on the Cloud via Multikey Fully Homomorphic Encryption.
IACR Cryptol. ePrint Arch., 2013

RSA Key Extraction via Low-Bandwidth Acoustic Cryptanalysis.
IACR Cryptol. ePrint Arch., 2013

Enforcing Language Semantics Using Proof-Carrying Data.
IACR Cryptol. ePrint Arch., 2013

Succinct Non-Interactive Arguments for a von Neumann Architecture.
IACR Cryptol. ePrint Arch., 2013

SNARKs for C: Verifying Program Executions Succinctly and in Zero Knowledge.
IACR Cryptol. ePrint Arch., 2013

On the concrete efficiency of probabilistically-checkable proofs.
Proceedings of the Symposium on Theory of Computing Conference, 2013

Analyzing Unique-Bid Auction Sites for Fun and Profit.
Proceedings of the 20th Annual Network and Distributed System Security Symposium, 2013

Fast reductions from RAMs to delegatable succinct constraint satisfaction problems: extended abstract.
Proceedings of the Innovations in Theoretical Computer Science, 2013

2012
Using More Data to Speed-up Training Time.
Proceedings of the Fifteenth International Conference on Artificial Intelligence and Statistics, 2012

Recursive Composition and Bootstrapping for SNARKs and Proof-Carrying Data.
IACR Cryptol. ePrint Arch., 2012

Fast Reductions from RAMs to Delegatable Succinct Constraint Satisfaction Problems.
IACR Cryptol. ePrint Arch., 2012

On the Concrete-Efficiency Threshold of Probabilistically-Checkable Proofs.
Electron. Colloquium Comput. Complex., 2012

Multiparty Computation with Low Communication, Computation and Interaction via Threshold FHE.
Proceedings of the Advances in Cryptology - EUROCRYPT 2012, 2012

2011
TWIRL.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Cloud-Assisted Multiparty Computation from Fully Homomorphic Encryption.
IACR Cryptol. ePrint Arch., 2011

From Extractable Collision Resistance to Succinct Non-Interactive Arguments of Knowledge, and Back Again.
IACR Cryptol. ePrint Arch., 2011

2010
Efficient Cache Attacks on AES, and Countermeasures.
J. Cryptol., 2010

Proof-Carrying Data and Hearsay Arguments from Signature Cards.
Proceedings of the Innovations in Computer Science, 2010

Protecting Circuits from Leakage: the Computationally-Bounded and Noisy Cases.
Proceedings of the Advances in Cryptology - EUROCRYPT 2010, 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Monaco / French Riviera, May 30, 2010

2009
Protecting Circuits from Computationally-Bounded Leakage.
IACR Cryptol. ePrint Arch., 2009

Noninterference for a Practical DIFC-Based Operating System.
Proceedings of the 30th IEEE Symposium on Security and Privacy (SP 2009), 2009

Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds.
Proceedings of the 2009 ACM Conference on Computer and Communications Security, 2009

2008
Path-quality monitoring in the presence of adversaries.
Proceedings of the 2008 ACM SIGMETRICS International Conference on Measurement and Modeling of Computer Systems, 2008

2005
TWIRL.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

Cache attacks and Countermeasures: the Case of AES.
IACR Cryptol. ePrint Arch., 2005

Efficiently Constructible Huge Graphs That Preserve First Order Properties of Random Graphs.
Proceedings of the Theory of Cryptography, Second Theory of Cryptography Conference, 2005

Improved Routing-Based Linear Algebra for the Number Field Sieve.
Proceedings of the International Symposium on Information Technology: Coding and Computing (ITCC 2005), 2005

Scalable Hardware for Sparse Systems of Linear Equations, with Applications to Integer Factorization.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2005, 7th International Workshop, Edinburgh, UK, August 29, 2005

2003
Factoring Large Number with the TWIRL Device.
Proceedings of the Advances in Cryptology, 2003

True Random Number Generators Secure in a Changing Environment.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2003

Factoring Estimates for a 1024-Bit RSA Modulus.
Proceedings of the Advances in Cryptology - ASIACRYPT 2003, 9th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, November 30, 2003

2002
Analysis of Bernstein's Factorization Circuit.
Proceedings of the Advances in Cryptology, 2002


  Loading...