Follow
Eran Tromer
Eran Tromer
Tel Aviv University + Columbia University
Verified email at cs.tau.ac.il - Homepage
Title
Cited by
Cited by
Year
Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds
T Ristenpart, E Tromer, H Shacham, S Savage
ACM conference on Computer and Communications Security (CCS), 199-212, 2009
29112009
Zerocash: Decentralized anonymous payments from Bitcoin
EB Sasson, A Chiesa, C Garman, M Green, I Miers, E Tromer, M Virza
IEEE Symposium on Security and Privacy (SP) 2014, 459-474, 2014
22652014
Cache attacks and countermeasures: the case of AES
DA Osvik, A Shamir, E Tromer
CT-RSA 2006, 1-20, 2006
18012006
On-the-fly multiparty computation on the cloud via multikey fully homomorphic encryption
A López-Alt, E Tromer, V Vaikuntanathan
ACM symposium on Theory of Computing (STOC) 2012, 1219-1234, 2012
10402012
SNARKs for C: Verifying program executions succinctly and in zero knowledge
E Ben-Sasson, A Chiesa, D Genkin, E Tromer, M Virza
CRYPTO 2013, 90-108, 2013
7372013
Succinct {Non-Interactive} zero knowledge for a von neumann architecture
E Ben-Sasson, A Chiesa, E Tromer, M Virza
23rd USENIX Security Symposium (USENIX Security 14), 781-796, 2014
7312014
Efficient cache attacks on AES, and countermeasures
E Tromer, DA Osvik, A Shamir
Journal of Cryptology 23, 37-71, 2010
6182010
RSA Key Extraction via Low-Bandwidth Acoustic Cryptanalysis.
D Genkin, A Shamir, E Tromer
CRYPTO 2014 1, 444-461, 2014
6022014
From extractable collision resistance to succinct non-interactive arguments of knowledge, and back again
N Bitansky, R Canetti, A Chiesa, E Tromer
Innovations in Theoretical Computer Science Conference (ITCS) 2012, 326-349, 2012
5222012
Multiparty computation with low communication, computation and interaction via threshold FHE
G Asharov, A Jain, A López-Alt, E Tromer, V Vaikuntanathan, D Wichs
Eurocrypt 2012, 483-501, 2012
4742012
Recursive composition and bootstrapping for SNARKs and proof-carrying data
N Bitansky, R Canetti, A Chiesa, E Tromer
ACM symposium on Theory of computing (STOC) 2013, 111-120, 2013
3272013
Scalable zero knowledge via cycles of elliptic curves
E Ben-Sasson, A Chiesa, E Tromer, M Virza
CRYPTO 2014 2, 276-294, 2014
3052014
Get your hands off my laptop: Physical side-channel key-extraction attacks on PCs (extended version)
D Genkin, I Pipman, E Tromer
Journal of Cryptographic Engineering 5 (2), 95-112, 2015
2292015
ECDSA key extraction from mobile devices via nonintrusive physical side channels
D Genkin, L Pachmanov, I Pipman, E Tromer, Y Yarom
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
2132016
Stealing Keys from PCs using a Radio: Cheap Electromagnetic Attacks on Windowed Exponentiation
D Genkin, L Pachmanov, I Pipman, E Tromer
Workshop on Cryptographic Hardware and Embedded Systems (CHES) 2015, 207-228, 2015
2022015
Secure sampling of public parameters for succinct zero knowledge proofs
E Ben-Sasson, A Chiesa, M Green, E Tromer, M Virza
IEEE Symposium on Security and Privacy (SP) 2015, 287-304, 2015
1882015
Beauty and the burst: Remote identification of encrypted video streams
R Schuster, V Shmatikov, E Tromer
26th USENIX Security Symposium (USENIX Security 17), 1357-1374, 2017
1852017
Factoring large numbers with the TWIRL device
A Shamir, E Tromer
CRYPTO 2003, 1-26, 2003
1812003
True random number generators secure in a changing environment
B Barak, R Shaltiel, E Tromer
Cryptographic hardware and embedded systems (CHES) 2003, 166-180, 2003
1702003
Protecting circuits from leakage: the computationally-bounded and noisy cases
S Faust, T Rabin, L Reyzin, E Tromer, V Vaikuntanathan
Advances in Cryptology–EUROCRYPT 2010: 29th Annual International Conference …, 2010
1692010
The system can't perform the operation now. Try again later.
Articles 1–20