Eran Tromer
Eran Tromer
Tel Aviv University + Columbia University
Verified email at cs.tau.ac.il - Homepage
TitleCited byYear
Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds
T Ristenpart, E Tromer, H Shacham, S Savage
ACM conference on Computer and Communications Security (CCS), 199-212, 2009
22472009
Cache attacks and countermeasures: the case of AES
DA Osvik, A Shamir, E Tromer
CT-RSA 2006, 1-20, 2006
10432006
Zerocash: Decentralized anonymous payments from Bitcoin
EB Sasson, A Chiesa, C Garman, M Green, I Miers, E Tromer, M Virza
IEEE Symposium on Security and Privacy (SP) 2014, 459-474, 2014
7912014
On-the-fly multiparty computation on the cloud via multikey fully homomorphic encryption
A López-Alt, E Tromer, V Vaikuntanathan
ACM symposium on Theory of Computing (STOC) 2012, 1219-1234, 2012
6112012
RSA Key Extraction via Low-Bandwidth Acoustic Cryptanalysis.
D Genkin, A Shamir, E Tromer
CRYPTO 2014 1, 444-461, 2014
3612014
Efficient cache attacks on AES, and countermeasures
E Tromer, DA Osvik, A Shamir
Journal of Cryptology 23 (1), 37-71, 2010
3572010
SNARKs for C: Verifying program executions succinctly and in zero knowledge
E Ben-Sasson, A Chiesa, D Genkin, E Tromer, M Virza
CRYPTO 2013, 90-108, 2013
3402013
From extractable collision resistance to succinct non-interactive arguments of knowledge, and back again
N Bitansky, R Canetti, A Chiesa, E Tromer
Innovations in Theoretical Computer Science Conference (ITCS) 2012, 326-349, 2012
2612012
Succinct non-interactive zero knowledge for a von Neumann architecture
E Ben-Sasson, A Chiesa, E Tromer, M Virza
23rd {USENIX} Security Symposium ({USENIX} Security 14), 781-796, 2014
2562014
Multiparty computation with low communication, computation and interaction via threshold FHE
G Asharov, A Jain, A López-Alt, E Tromer, V Vaikuntanathan, D Wichs
Eurocrypt 2012, 483-501, 2012
2452012
Recursive composition and bootstrapping for SNARKs and proof-carrying data
N Bitansky, R Canetti, A Chiesa, E Tromer
ACM symposium on Theory of computing (STOC) 2013, 111-120, 2013
1802013
Factoring large numbers with the TWIRL device
A Shamir, E Tromer
CRYPTO 2003, 1-26, 2003
1652003
Protecting circuits from leakage: the computationally-bounded and noisy cases
S Faust, T Rabin, L Reyzin, E Tromer, V Vaikuntanathan
Annual International Conference on the Theory and Applications of …, 2010
1422010
True random number generators secure in a changing environment
B Barak, R Shaltiel, E Tromer
Cryptographic hardware and embedded systems (CHES) 2003, 166-180, 2003
1382003
Get your hands off my laptop: Physical side-channel key-extraction attacks on PCs (extended version)
D Genkin, I Pipman, E Tromer
Journal of Cryptographic Engineering 5 (2), 95-112, 2015
1242015
Get your hands off my laptop: Physical side-channel key-extraction attacks on PCs
D Genkin, I Pipman, E Tromer
Cryptographic Hardware and Embedded Systems (CHES) 2014, 242-260, 2014
1242014
Scalable zero knowledge via cycles of elliptic curves
E Ben-Sasson, A Chiesa, E Tromer, M Virza
CRYPTO 2014 2, 276-294, 2014
1232014
Acoustic cryptanalysis: on nosy people and noisy machines
A Shamir, E Tromer
Online at http://people. csail. mit. edu/tromer/acoustic, 2004
1202004
Stealing Keys from PCs using a Radio: Cheap Electromagnetic Attacks on Windowed Exponentiation
D Genkin, L Pachmanov, I Pipman, E Tromer
Workshop on Cryptographic Hardware and Embedded Systems (CHES) 2015, 207-228, 2015
1142015
Path-quality monitoring in the presence of adversaries
S Goldberg, D Xiao, E Tromer, B Barak, J Rexford
ACM SIGMETRICS Performance Evaluation Review 36 (1), 193-204, 2008
1142008
The system can't perform the operation now. Try again later.
Articles 1–20