Eran Tromer

According to our database1, Eran Tromer authored at least 58 papers between 2002 and 2018.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepage:

On csauthors.net:

Bibliography

2018
Situational Access Control in the Internet of Things.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

Drive-By Key-Extraction Cache Attacks from Portable Code.
Proceedings of the Applied Cryptography and Network Security, 2018

2017
Multikey Fully Homomorphic Encryption and Applications.
SIAM J. Comput., 2017

Acoustic Cryptanalysis.
J. Cryptology, 2017

The Hunting of the SNARK.
J. Cryptology, 2017

Beauty and the Burst: Remote Identification of Encrypted Video Streams.
Proceedings of the 26th USENIX Security Symposium, 2017

Computational Integrity with a Public Random String from Quasi-Linear PCPs.
Proceedings of the Advances in Cryptology - EUROCRYPT 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30, 2017

2016
Physical key extraction attacks on PCs.
Commun. ACM, 2016

PhotoProof: Cryptographic Image Authentication for Any Set of Permissible Transformations.
Proceedings of the IEEE Symposium on Security and Privacy, 2016

Fast Multiplication in Binary Fields on GPUs via Register Cache.
Proceedings of the 2016 International Conference on Supercomputing, 2016

ECDH Key-Extraction via Low-Bandwidth Electromagnetic Attacks on PCs.
Proceedings of the Topics in Cryptology - CT-RSA 2016 - The Cryptographers' Track at the RSA Conference 2016, San Francisco, CA, USA, February 29, 2016

DroidDisintegrator: Intra-Application Information Flow Control in Android Apps.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

ECDSA Key Extraction from Mobile Devices via Nonintrusive Physical Side Channels.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

2015
Path-Quality Monitoring in the Presence of Adversaries: The Secure Sketch Protocols.
IEEE/ACM Trans. Netw., 2015

Get your hands off my laptop: physical side-channel key-extraction attacks on PCs - Extended version.
J. Cryptographic Engineering, 2015

Secure Sampling of Public Parameters for Succinct Zero Knowledge Proofs.
Proceedings of the 2015 IEEE Symposium on Security and Privacy, 2015

Secure Association for the Internet of Things.
Proceedings of the 2015 International Workshop on Secure Internet of Things, 2015

Cluster Computing in Zero Knowledge.
Proceedings of the Advances in Cryptology - EUROCRYPT 2015, 2015

Stealing Keys from PCs Using a Radio: Cheap Electromagnetic Attacks on Windowed Exponentiation.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2015, 2015

2014
Protecting Circuits from Computationally Bounded and Noisy Leakage.
SIAM J. Comput., 2014

The Hunting of the SNARK.
IACR Cryptology ePrint Archive, 2014

Succinct Non-Interactive Zero Knowledge for a von Neumann Architecture.
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014

Circuits resilient to additive attacks with applications to secure computation.
Proceedings of the Symposium on Theory of Computing, 2014

Zerocash: Decentralized Anonymous Payments from Bitcoin.
Proceedings of the 2014 IEEE Symposium on Security and Privacy, 2014

RSA Key Extraction via Low-Bandwidth Acoustic Cryptanalysis.
Proceedings of the Advances in Cryptology - CRYPTO 2014, 2014

Scalable Zero Knowledge via Cycles of Elliptic Curves.
Proceedings of the Advances in Cryptology - CRYPTO 2014, 2014

Get Your Hands Off My Laptop: Physical Side-Channel Key-Extraction Attacks on PCs.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2014, 2014

2013
Enforcing Language Semantics Using Proof-Carrying Data.
IACR Cryptology ePrint Archive, 2013

Succinct Non-Interactive Arguments for a von Neumann Architecture.
IACR Cryptology ePrint Archive, 2013

Recursive composition and bootstrapping for SNARKS and proof-carrying data.
Proceedings of the Symposium on Theory of Computing Conference, 2013

On the concrete efficiency of probabilistically-checkable proofs.
Proceedings of the Symposium on Theory of Computing Conference, 2013

Analyzing Unique-Bid Auction Sites for Fun and Profit.
Proceedings of the 20th Annual Network and Distributed System Security Symposium, 2013

Fast reductions from RAMs to delegatable succinct constraint satisfaction problems: extended abstract.
Proceedings of the Innovations in Theoretical Computer Science, 2013

SNARKs for C: Verifying Program Executions Succinctly and in Zero Knowledge.
Proceedings of the Advances in Cryptology - CRYPTO 2013, 2013

2012
Using More Data to Speed-up Training Time.
Proceedings of the Fifteenth International Conference on Artificial Intelligence and Statistics, 2012

Fast Reductions from RAMs to Delegatable Succinct Constraint Satisfaction Problems.
IACR Cryptology ePrint Archive, 2012

On the Concrete-Efficiency Threshold of Probabilistically-Checkable Proofs.
Electronic Colloquium on Computational Complexity (ECCC), 2012

On-the-fly multiparty computation on the cloud via multikey fully homomorphic encryption.
Proceedings of the 44th Symposium on Theory of Computing Conference, 2012

From extractable collision resistance to succinct non-interactive arguments of knowledge, and back again.
Proceedings of the Innovations in Theoretical Computer Science 2012, 2012

Multiparty Computation with Low Communication, Computation and Interaction via Threshold FHE.
Proceedings of the Advances in Cryptology - EUROCRYPT 2012, 2012

2011
TWIRL.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Cloud-Assisted Multiparty Computation from Fully Homomorphic Encryption.
IACR Cryptology ePrint Archive, 2011

2010
Efficient Cache Attacks on AES, and Countermeasures.
J. Cryptology, 2010

Proof-Carrying Data and Hearsay Arguments from Signature Cards.
Proceedings of the Innovations in Computer Science, 2010

Protecting Circuits from Leakage: the Computationally-Bounded and Noisy Cases.
Proceedings of the Advances in Cryptology - EUROCRYPT 2010, 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Monaco / French Riviera, May 30, 2010

2009
Protecting Circuits from Computationally-Bounded Leakage.
IACR Cryptology ePrint Archive, 2009

Noninterference for a Practical DIFC-Based Operating System.
Proceedings of the 30th IEEE Symposium on Security and Privacy (S&P 2009), 2009

Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds.
Proceedings of the 2009 ACM Conference on Computer and Communications Security, 2009

2008
Path-quality monitoring in the presence of adversaries.
Proceedings of the 2008 ACM SIGMETRICS International Conference on Measurement and Modeling of Computer Systems, 2008

2006
Cache Attacks and Countermeasures: The Case of AES.
Proceedings of the Topics in Cryptology, 2006

2005
TWIRL.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

Efficiently Constructible Huge Graphs That Preserve First Order Properties of Random Graphs.
Proceedings of the Theory of Cryptography, Second Theory of Cryptography Conference, 2005

Improved Routing-Based Linear Algebra for the Number Field Sieve.
Proceedings of the International Symposium on Information Technology: Coding and Computing (ITCC 2005), 2005

Scalable Hardware for Sparse Systems of Linear Equations, with Applications to Integer Factorization.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2005, 7th International Workshop, Edinburgh, UK, August 29, 2005

2003
Factoring Large Number with the TWIRL Device.
Proceedings of the Advances in Cryptology, 2003

True Random Number Generators Secure in a Changing Environment.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2003

Factoring Estimates for a 1024-Bit RSA Modulus.
Proceedings of the Advances in Cryptology - ASIACRYPT 2003, 9th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, November 30, 2003

2002
Analysis of Bernstein's Factorization Circuit.
Proceedings of the Advances in Cryptology, 2002


  Loading...