What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Eran Tromer
Google Scholar
ORCID:
0000-0002-8884-9564
47
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/eurocrypt
Snake-Eye Resistant PKE from LWE for Oblivious Message Retrieval and Robust Encryption.
Zeyu Liu
Katerina Sotiraki
Eran Tromer
Yunhao Wang
2024
conf/uss
ZKSMT: A VM for Proving SMT Theorems in Zero Knowledge.
Daniel Luick
John C. Kolesar
Timos Antonopoulos
William R. Harris
James Parker
Ruzica Piskac
Eran Tromer
Xiao Wang
Ning Luo
2024
conf/uss
PerfOMR: Oblivious Message Retrieval with Reduced Communication and Computation.
Zeyu Liu
Eran Tromer
Yunhao Wang
2024
conf/sp
Group Oblivious Message Retrieval.
Zeyu Liu
Eran Tromer
Yunhao Wang
2023
conf/ccs
Optical Cryptanalysis: Recovering Cryptographic Keys from Power LED Light Fluctuations.
Ben Nassi
Ofek Vayner
Etay Iluz
Dudi Nassi
Jan Jancar
Daniel Genkin
Eran Tromer
Boris Zadov
Yuval Elovici
2023
conf/uss
Cheesecloth: Zero-Knowledge Proofs of Real World Vulnerabilities.
Santiago Cuéllar
Bill Harris
James Parker
Stuart Pernsteiner
Eran Tromer
2023
conf/uss
Squint Hard Enough: Attacking Perceptual Hashing with Adversarial Machine Learning.
Jonathan Prokos
Neil Fendley
Matthew Green
Roei Schuster
Eran Tromer
Tushar M. Jois
Yinzhi Cao
2022
conf/ccs
Proving UNSAT in Zero Knowledge.
Ning Luo
Timos Antonopoulos
William R. Harris
Ruzica Piskac
Eran Tromer
Xiao Wang
2022
conf/uss
Lend Me Your Ear: Passive Remote Physical Side Channels on PCs.
Daniel Genkin
Noam Nissan
Roei Schuster
Eran Tromer
2022
conf/crypto
Oblivious Message Retrieval.
Zeyu Liu
Eran Tromer
2022
conf/fc
Plumo: An Ultralight Blockchain Client.
Psi Vesely
Kobi Gurkan
Michael Straka
Ariel Gabizon
Philipp Jovanovic
Georgios Konstantopoulos
Asa Oines
Marek Olszewski
Eran Tromer
2022
conf/eurocrypt
Unclonable Polymers and Their Cryptographic Applications.
Ghada Almashaqbeh
Ran Canetti
Yaniv Erlich
Jonathan Gershoni
Tal Malkin
Itsik Pe'er
Anna Roitburd-Berman
Eran Tromer
2021
journals/popets
Gage MPC: Bypassing Residual Function Leakage for Non-Interactive MPC.
Ghada Almashaqbeh
Fabrice Benhamouda
Seungwook Han
Daniel Jaroslawicz
Tal Malkin
Alex Nicita
Tal Rabin
Abhishek Shah
Eran Tromer
2021
conf/uss
You Autocomplete Me: Poisoning Vulnerabilities in Neural Code Completion.
Roei Schuster
Congzheng Song
Eran Tromer
Vitaly Shmatikov
2019
conf/sp
Synesthesia: Detecting Screen Content via Remote Acoustic Side Channels.
Daniel Genkin
Mihir Pattani
Roei Schuster
Eran Tromer
2018
conf/ccs
Situational Access Control in the Internet of Things.
Roei Schuster
Vitaly Shmatikov
Eran Tromer
2018
conf/acns
Drive-By Key-Extraction Cache Attacks from Portable Code.
Daniel Genkin
Lev Pachmanov
Eran Tromer
Yuval Yarom
2017
journals/joc
Acoustic Cryptanalysis.
Daniel Genkin
Adi Shamir
Eran Tromer
2017
journals/joc
The Hunting of the SNARK.
Nir Bitansky
Ran Canetti
Alessandro Chiesa
Shafi Goldwasser
Huijia Lin
Aviad Rubinstein
Eran Tromer
2017
conf/uss
Beauty and the Burst: Remote Identification of Encrypted Video Streams.
Roei Schuster
Vitaly Shmatikov
Eran Tromer
2017
conf/eurocrypt
Computational Integrity with a Public Random String from Quasi-Linear PCPs.
Eli Ben-Sasson
Iddo Bentov
Alessandro Chiesa
Ariel Gabizon
Daniel Genkin
Matan Hamilis
Evgenya Pergament
Michael Riabzev
Mark Silberstein
Eran Tromer
Madars Virza
2016
conf/ccs
ECDSA Key Extraction from Mobile Devices via Nonintrusive Physical Side Channels.
Daniel Genkin
Lev Pachmanov
Itamar Pipman
Eran Tromer
Yuval Yarom
2016
conf/ccs
DroidDisintegrator: Intra-Application Information Flow Control in Android Apps.
Eran Tromer
Roei Schuster
2016
conf/sp
PhotoProof: Cryptographic Image Authentication for Any Set of Permissible Transformations.
Assa Naveh
Eran Tromer
2016
conf/ctrsa
ECDH Key-Extraction via Low-Bandwidth Electromagnetic Attacks on PCs.
Daniel Genkin
Lev Pachmanov
Itamar Pipman
Eran Tromer
2015
conf/sp
Secure Sampling of Public Parameters for Succinct Zero Knowledge Proofs.
Eli Ben-Sasson
Alessandro Chiesa
Matthew Green
Eran Tromer
Madars Virza
2015
conf/ches
Stealing Keys from PCs Using a Radio: Cheap Electromagnetic Attacks on Windowed Exponentiation.
Daniel Genkin
Lev Pachmanov
Itamar Pipman
Eran Tromer
2015
conf/eurocrypt
Cluster Computing in Zero Knowledge.
Alessandro Chiesa
Eran Tromer
Madars Virza
2014
conf/uss
Succinct Non-Interactive Zero Knowledge for a von Neumann Architecture.
Eli Ben-Sasson
Alessandro Chiesa
Eran Tromer
Madars Virza
2014
conf/crypto
Scalable Zero Knowledge via Cycles of Elliptic Curves.
Eli Ben-Sasson
Alessandro Chiesa
Eran Tromer
Madars Virza
2014
conf/crypto
RSA Key Extraction via Low-Bandwidth Acoustic Cryptanalysis.
Daniel Genkin
Adi Shamir
Eran Tromer
2014
conf/sp
Zerocash: Decentralized Anonymous Payments from Bitcoin.
Eli Ben-Sasson
Alessandro Chiesa
Christina Garman
Matthew Green
Ian Miers
Eran Tromer
Madars Virza
2014
conf/ches
Get Your Hands Off My Laptop: Physical Side-Channel Key-Extraction Attacks on PCs.
Daniel Genkin
Itamar Pipman
Eran Tromer
2013
conf/crypto
SNARKs for C: Verifying Program Executions Succinctly and in Zero Knowledge.
Eli Ben-Sasson
Alessandro Chiesa
Daniel Genkin
Eran Tromer
Madars Virza
2013
conf/ndss
Analyzing Unique-Bid Auction Sites for Fun and Profit.
Ory Samorodnitzky
Eran Tromer
Avishai Wool
2012
conf/eurocrypt
Multiparty Computation with Low Communication, Computation and Interaction via Threshold FHE.
Gilad Asharov
Abhishek Jain
Adriana López-Alt
Eran Tromer
Vinod Vaikuntanathan
Daniel Wichs
2010
journals/joc
Efficient Cache Attacks on AES, and Countermeasures.
Eran Tromer
Dag Arne Osvik
Adi Shamir
2010
conf/eurocrypt
Protecting Circuits from Leakage: the Computationally-Bounded and Noisy Cases.
Sebastian Faust
Tal Rabin
Leonid Reyzin
Eran Tromer
Vinod Vaikuntanathan
2009
conf/ccs
Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds.
Thomas Ristenpart
Eran Tromer
Hovav Shacham
Stefan Savage
2009
conf/sp
Noninterference for a Practical DIFC-Based Operating System.
Maxwell N. Krohn
Eran Tromer
2006
conf/ctrsa
Cache Attacks and Countermeasures: The Case of AES.
Dag Arne Osvik
Adi Shamir
Eran Tromer
2005
conf/ches
Scalable Hardware for Sparse Systems of Linear Equations, with Applications to Integer Factorization.
Willi Geiselmann
Adi Shamir
Rainer Steinwandt
Eran Tromer
2005
conf/tcc
Efficiently Constructible Huge Graphs That Preserve First Order Properties of Random Graphs.
Moni Naor
Asaf Nussboim
Eran Tromer
2003
conf/crypto
Factoring Large Number with the TWIRL Device.
Adi Shamir
Eran Tromer
2003
conf/ches
True Random Number Generators Secure in a Changing Environment.
Boaz Barak
Ronen Shaltiel
Eran Tromer
2003
conf/asiacrypt
Factoring Estimates for a 1024-Bit RSA Modulus.
Arjen K. Lenstra
Eran Tromer
Adi Shamir
Wil Kortsmit
Bruce Dodson
James P. Hughes
Paul C. Leyland
2002
conf/asiacrypt
Analysis of Bernstein's Factorization Circuit.
Arjen K. Lenstra
Adi Shamir
Jim Tomlinson
Eran Tromer
Coauthors
Abhishek Jain
(1)
Abhishek Shah
(1)
Adi Shamir
(8)
Adriana López-Alt
(1)
Alessandro Chiesa
(8)
Alex Nicita
(1)
Anna Roitburd-Berman
(1)
Ariel Gabizon
(2)
Arjen K. Lenstra
(2)
Asa Oines
(1)
Asaf Nussboim
(1)
Assa Naveh
(1)
Aviad Rubinstein
(1)
Avishai Wool
(1)
Ben Nassi
(1)
Bill Harris
(1)
Boaz Barak
(1)
Boris Zadov
(1)
Bruce Dodson
(1)
Christina Garman
(1)
Congzheng Song
(1)
Dag Arne Osvik
(2)
Daniel Genkin
(12)
Daniel Jaroslawicz
(1)
Daniel Luick
(1)
Daniel Wichs
(1)
Dudi Nassi
(1)
Eli Ben-Sasson
(6)
Eran Tromer
(47)
Etay Iluz
(1)
Evgenya Pergament
(1)
Fabrice Benhamouda
(1)
Georgios Konstantopoulos
(1)
Ghada Almashaqbeh
(2)
Gilad Asharov
(1)
Hovav Shacham
(1)
Huijia Lin
(1)
Ian Miers
(1)
Iddo Bentov
(1)
Itamar Pipman
(4)
Itsik Pe'er
(1)
James P. Hughes
(1)
James Parker
(2)
Jan Jancar
(1)
Jim Tomlinson
(1)
John C. Kolesar
(1)
Jonathan Gershoni
(1)
Jonathan Prokos
(1)
Katerina Sotiraki
(1)
Kobi Gurkan
(1)
Leonid Reyzin
(1)
Lev Pachmanov
(4)
Madars Virza
(7)
Marek Olszewski
(1)
Mark Silberstein
(1)
Matan Hamilis
(1)
Matthew Green
(3)
Maxwell N. Krohn
(1)
Michael Riabzev
(1)
Michael Straka
(1)
Mihir Pattani
(1)
Moni Naor
(1)
Neil Fendley
(1)
Ning Luo
(2)
Nir Bitansky
(1)
Noam Nissan
(1)
Ofek Vayner
(1)
Ory Samorodnitzky
(1)
Paul C. Leyland
(1)
Philipp Jovanovic
(1)
Psi Vesely
(1)
Rainer Steinwandt
(1)
Ran Canetti
(2)
Roei Schuster
(7)
Ronen Shaltiel
(1)
Ruzica Piskac
(2)
Santiago Cuéllar
(1)
Sebastian Faust
(1)
Seungwook Han
(1)
Shafi Goldwasser
(1)
Stefan Savage
(1)
Stuart Pernsteiner
(1)
Tal Malkin
(2)
Tal Rabin
(2)
Thomas Ristenpart
(1)
Timos Antonopoulos
(2)
Tushar M. Jois
(1)
Vinod Vaikuntanathan
(2)
Vitaly Shmatikov
(3)
Wil Kortsmit
(1)
Willi Geiselmann
(1)
William R. Harris
(2)
Xiao Wang
(2)
Yaniv Erlich
(1)
Yinzhi Cao
(1)
Yunhao Wang
(3)
Yuval Elovici
(1)
Yuval Yarom
(2)
Zeyu Liu
(4)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to