Follow
Eran Tromer
Title
Cited by
Cited by
Year
Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds
T Ristenpart, E Tromer, H Shacham, S Savage
ACM conference on Computer and Communications Security (CCS), 199-212, 2009
30462009
Zerocash: Decentralized anonymous payments from Bitcoin
EB Sasson, A Chiesa, C Garman, M Green, I Miers, E Tromer, M Virza
IEEE Symposium on Security and Privacy (SP) 2014, 459-474, 2014
26652014
Cache attacks and countermeasures: the case of AES
DA Osvik, A Shamir, E Tromer
CT-RSA 2006, 1-20, 2006
19992006
On-the-fly multiparty computation on the cloud via multikey fully homomorphic encryption
A López-Alt, E Tromer, V Vaikuntanathan
ACM symposium on Theory of Computing (STOC) 2012, 1219-1234, 2012
12032012
Succinct non-interactive zero knowledge for a von Neumann architecture
E Ben-Sasson, A Chiesa, E Tromer, M Virza
23rd USENIX Security Symposium (USENIX Security 14), 781-796, 2014
9202014
SNARKs for C: Verifying program executions succinctly and in zero knowledge
E Ben-Sasson, A Chiesa, D Genkin, E Tromer, M Virza
CRYPTO 2013, 90-108, 2013
8762013
From extractable collision resistance to succinct non-interactive arguments of knowledge, and back again
N Bitansky, R Canetti, A Chiesa, E Tromer
Innovations in Theoretical Computer Science Conference (ITCS) 2012, 326-349, 2012
6742012
RSA Key Extraction via Low-Bandwidth Acoustic Cryptanalysis.
D Genkin, A Shamir, E Tromer
CRYPTO 2014 1, 444-461, 2014
6622014
Efficient cache attacks on AES, and countermeasures
E Tromer, DA Osvik, A Shamir
Journal of Cryptology 23, 37-71, 2010
6582010
Multiparty computation with low communication, computation and interaction via threshold FHE
G Asharov, A Jain, A López-Alt, E Tromer, V Vaikuntanathan, D Wichs
Eurocrypt 2012, 483-501, 2012
5872012
Recursive composition and bootstrapping for SNARKs and proof-carrying data
N Bitansky, R Canetti, A Chiesa, E Tromer
ACM symposium on Theory of computing (STOC) 2013, 111-120, 2013
4132013
Scalable zero knowledge via cycles of elliptic curves
E Ben-Sasson, A Chiesa, E Tromer, M Virza
CRYPTO 2014 2, 276-294, 2014
3832014
Get your hands off my laptop: Physical side-channel key-extraction attacks on PCs (extended version)
D Genkin, I Pipman, E Tromer
Journal of Cryptographic Engineering 5 (2), 95-112, 2015
2482015
ECDSA key extraction from mobile devices via nonintrusive physical side channels
D Genkin, L Pachmanov, I Pipman, E Tromer, Y Yarom
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
2442016
Beauty and the burst: Remote identification of encrypted video streams
R Schuster, V Shmatikov, E Tromer
26th USENIX Security Symposium (USENIX Security 17), 1357-1374, 2017
2302017
Secure sampling of public parameters for succinct zero knowledge proofs
E Ben-Sasson, A Chiesa, M Green, E Tromer, M Virza
IEEE Symposium on Security and Privacy (SP) 2015, 287-304, 2015
2282015
Stealing Keys from PCs using a Radio: Cheap Electromagnetic Attacks on Windowed Exponentiation
D Genkin, L Pachmanov, I Pipman, E Tromer
Workshop on Cryptographic Hardware and Embedded Systems (CHES) 2015, 207-228, 2015
2262015
The hunting of the SNARK
N Bitansky, R Canetti, A Chiesa, S Goldwasser, H Lin, A Rubinstein, ...
Journal of Cryptology 30 (4), 989-1066, 2017
1982017
Protecting circuits from leakage: the computationally-bounded and noisy cases
S Faust, T Rabin, L Reyzin, E Tromer, V Vaikuntanathan
Advances in Cryptology–EUROCRYPT 2010: 29th Annual International Conference …, 2010
1902010
Factoring large numbers with the TWIRL device
A Shamir, E Tromer
CRYPTO 2003, 1-26, 2003
1832003
The system can't perform the operation now. Try again later.
Articles 1–20