Eran Tromer

Professor

20022024

Research activity per year

Search results

  • 2024

    Group Oblivious Message Retrieval

    Liu, Z., Tromer, E. & Wang, Y., 2024, Proceedings - 45th IEEE Symposium on Security and Privacy, SP 2024. Institute of Electrical and Electronics Engineers Inc., p. 4367-4385 19 p. (Proceedings - IEEE Symposium on Security and Privacy).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • PerfOMR: Oblivious Message Retrieval with Reduced Communication and Computation

    Liu, Z., Tromer, E. & Wang, Y., 2024, Proceedings of the 33rd USENIX Security Symposium. USENIX Association, p. 3169-3186 18 p. (Proceedings of the 33rd USENIX Security Symposium).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Scopus citations
  • ZKSMT: A VM for Proving SMT Theorems in Zero Knowledge

    Luick, D., Kolesar, J. C., Antonopoulos, T., Harris, W. R., Parker, J., Piskac, R., Tromer, E., Wang, X. & Luo, N., 2024, Proceedings of the 33rd USENIX Security Symposium. USENIX Association, p. 3837-3854 18 p. (Proceedings of the 33rd USENIX Security Symposium).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Scopus citations
  • 2023

    Cheesecloth: Zero-Knowledge Proofs of Real-World Vulnerabilities

    Cuéllar, S., Harris, B., Parker, J., Pernsteiner, S. & Tromer, E., 2023, 32nd USENIX Security Symposium, USENIX Security 2023. USENIX Association, p. 6525-6540 16 p. (32nd USENIX Security Symposium, USENIX Security 2023; vol. 9).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    4 Scopus citations
  • Optical Cryptanalysis: Recovering Cryptographic Keys from Power LED Light Fluctuations

    Nassi, B., Vayner, O., Iluz, E., Nassi, D., Jancar, J., Genkin, D., Tromer, E., Zadov, B. & Elovici, Y., 15 Nov 2023, CCS 2023 - Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, Inc, p. 268-280 13 p. (CCS 2023 - Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    3 Scopus citations
  • Squint Hard Enough: Attacking Perceptual Hashing with Adversarial Machine Learning

    Prokos, J., Fendley, N., Green, M., Schuster, R., Tromer, E., Jois, T. M. & Cao, Y., 2023, 32nd USENIX Security Symposium, USENIX Security 2023. USENIX Association, p. 211-228 18 p. (32nd USENIX Security Symposium, USENIX Security 2023; vol. 1).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    6 Scopus citations
  • 2022

    Formalizing Human Ingenuity: A Quantitative Framework for Copyright Law's Substantial Similarity

    Scheffler, S., Tromer, E. & Varia, M., 1 Nov 2022, CSLAW 2022 - Proceedings of the 2022 Symposium on Computer Science and Law. Association for Computing Machinery, Inc, p. 37-49 13 p. (CSLAW 2022 - Proceedings of the 2022 Symposium on Computer Science and Law).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    6 Scopus citations
  • Lend Me Your Ear: Passive Remote Physical Side Channels on PCs

    Genkin, D., Nissan, N., Schuster, R. & Tromer, E., 2022, Proceedings of the 31st USENIX Security Symposium, Security 2022. USENIX Association, p. 4437-4454 18 p. (Proceedings of the 31st USENIX Security Symposium, Security 2022).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    10 Scopus citations
  • Oblivious Message Retrieval

    Liu, Z. & Tromer, E., 2022, Advances in Cryptology – CRYPTO 2022 - 42nd Annual International Cryptology Conference, CRYPTO 2022, Proceedings. Dodis, Y. & Shrimpton, T. (eds.). Springer Science and Business Media Deutschland GmbH, p. 753-783 31 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13507 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    12 Scopus citations
  • Plumo: An Ultralight Blockchain Client

    Vesely, P., Gurkan, K., Straka, M., Gabizon, A., Jovanovic, P., Konstantopoulos, G., Oines, A., Olszewski, M. & Tromer, E., 2022, Financial Cryptography and Data Security - 26th International Conference, FC 2022, Revised Selected Papers. Eyal, I. & Garay, J. (eds.). Springer Science and Business Media Deutschland GmbH, p. 597-614 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13411 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    4 Scopus citations
  • Proving UNSAT in Zero Knowledge

    Luo, N., Antonopoulos, T., Harris, W. R., Piskac, R., Tromer, E. & Wang, X., 7 Nov 2022, CCS 2022 - Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 2203-2217 15 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    9 Scopus citations
  • Toward Proactive Support for Older Adults

    Mendel, T., Schuster, R., Tromer, E. & Toch, E., Mar 2022, In: Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies. 6, 1, 25.

    Research output: Contribution to journalArticlepeer-review

    4 Scopus citations
  • Unclonable Polymers and Their Cryptographic Applications

    Almashaqbeh, G., Canetti, R., Erlich, Y., Gershoni, J., Malkin, T., Pe’er, I., Roitburd-Berman, A. & Tromer, E., 2022, Advances in Cryptology – EUROCRYPT 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, 2022, Proceedings. Dunkelman, O. & Dziembowski, S. (eds.). Springer Science and Business Media Deutschland GmbH, p. 759-789 31 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13275 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    2 Scopus citations
  • 2021

    You autocomplete me: Poisoning vulnerabilities in neural code completion

    Schuster, R., Song, C., Tromer, E. & Shmatikov, V., 2021, Proceedings of the 30th USENIX Security Symposium. USENIX Association, p. 1559-1575 17 p. (Proceedings of the 30th USENIX Security Symposium).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    75 Scopus citations
  • 2019

    Synesthesia: Detecting screen content via remote acoustic side channels

    Genkin, D., Pattani, M., Schuster, R. & Tromer, E., May 2019, Proceedings - 2019 IEEE Symposium on Security and Privacy, SP 2019. Institute of Electrical and Electronics Engineers Inc., p. 853-869 17 p. 8835386. (Proceedings - IEEE Symposium on Security and Privacy; vol. 2019-May).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    49 Scopus citations
  • 2018

    Drive-by key-extraction cache attacks from portable code

    Genkin, D., Pachmanov, L., Tromer, E. & Yarom, Y., 2018, Applied Cryptography and Network Security - 16th International Conference, ACNS 2018, Proceedings. Preneel, B. & Vercauteren, F. (eds.). Springer Verlag, p. 83-102 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10892 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    37 Scopus citations
  • Situational access control in the internet of things

    Schuster, R., Shmatikov, V. & Tromer, E., 15 Oct 2018, CCS 2018 - Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 1056-1073 18 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    72 Scopus citations
  • 2017

    Acoustic Cryptanalysis

    Genkin, D., Shamir, A. & Tromer, E., 1 Apr 2017, In: Journal of Cryptology. 30, 2, p. 392-443 52 p.

    Research output: Contribution to journalArticlepeer-review

    64 Scopus citations
  • Beauty and the burst: Remote identification of encrypted video streams

    Schuster, R., Shmatikov, V. & Tromer, E., 2017, Proceedings of the 26th USENIX Security Symposium. USENIX Association, p. 1357-1374 18 p. (Proceedings of the 26th USENIX Security Symposium).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    156 Scopus citations
  • Computational integrity with a public random string from quasi-linear PCPs

    Ben-Sasson, E., Bentov, I., Chiesa, A., Gabizon, A., Genkin, D., Hamilis, M., Pergament, E., Riabzev, M., Silberstein, M., Tromer, E. & Virza, M., 2017, Advances in Cryptology – EUROCRYPT 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. Coron, J.-S. & Nielsen, J. B. (eds.). Springer Verlag, p. 551-579 29 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10212 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    36 Scopus citations
  • Multikey fully homomorphic encryption and applications

    Lopez-Alt, A., Tromer, E. & Vaikuntanathan, V., 2017, In: SIAM Journal on Computing. 46, 6, p. 1827-1892 66 p.

    Research output: Contribution to journalArticlepeer-review

    Open Access
    15 Scopus citations
  • Scalable Zero Knowledge Via Cycles of Elliptic Curves

    Ben-Sasson, E., Chiesa, A., Tromer, E. & Virza, M., 1 Dec 2017, In: Algorithmica. 79, 4, p. 1102-1160 59 p.

    Research output: Contribution to journalArticlepeer-review

    55 Scopus citations
  • The Hunting of the SNARK

    Bitansky, N., Canetti, R., Chiesa, A., Goldwasser, S., Lin, H., Rubinstein, A. & Tromer, E., 1 Oct 2017, In: Journal of Cryptology. 30, 4, p. 989-1066 78 p.

    Research output: Contribution to journalArticlepeer-review

    78 Scopus citations
  • 2016

    Authors respond

    Genkin, D., Pachmanov, L., Pipman, I., Shamir, A. & Tromer, E., Aug 2016, In: Communications of the ACM. 59, 8, p. 8 1 p.

    Research output: Contribution to journalLetterpeer-review

  • DroidDisintegrator: Intra-application information flow control in android apps

    Tromer, E. & Schuster, R., 30 May 2016, ASIA CCS 2016 - Proceedings of the 11th ACM Asia Conference on Computer and Communications Security. Association for Computing Machinery, Inc, p. 401-412 12 p. (ASIA CCS 2016 - Proceedings of the 11th ACM Asia Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    13 Scopus citations
  • ECDH key-extraction via low-bandwidth electromagnetic attacks on PCs

    Genkin, D., Pachmanov, L., Pipman, I. & Tromer, E., 2016, Topics in Cryptology - The Cryptographers Track at the RSA Conference, CT-RSA 2016. Sako, K. (ed.). Springer Verlag, p. 219-235 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9610).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    56 Scopus citations
  • ECDSA key extraction from mobile devices via nonintrusive physical side channels

    Genkin, D., Pachmanov, L., Pipman, I., Tromer, E. & Yarom, Y., 24 Oct 2016, CCS 2016 - Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 1626-1638 13 p. (Proceedings of the ACM Conference on Computer and Communications Security; vol. 24-28-October-2016).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    142 Scopus citations
  • Fast multiplication in binary fields on GPUs via register cache

    Ben-Sasson, E., Hamilis, M., Silberstein, M. & Tromer, E., 1 Jun 2016, Proceedings of the 2016 International Conference on Supercomputing, ICS 2016. Association for Computing Machinery, a35. (Proceedings of the International Conference on Supercomputing; vol. 01-03-June-2016).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    16 Scopus citations
  • Future Cyberdefenses Will Defeat Cyberattacks on PCs Response

    Genkin, D., Pachmanov, L., Pipman, I., Shamir, A. & Tromer, E., Aug 2016, In: Communications of the ACM. 59, 8, p. 8-8

    Research output: Contribution to journalLetterpeer-review

  • PhotoProof: Cryptographic Image Authentication for Any Set of Permissible Transformations

    Naveh, A. & Tromer, E., 16 Aug 2016, Proceedings - 2016 IEEE Symposium on Security and Privacy, SP 2016. Institute of Electrical and Electronics Engineers Inc., p. 255-271 17 p. 7546506. (Proceedings - 2016 IEEE Symposium on Security and Privacy, SP 2016).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    50 Scopus citations
  • Physical key extraction attacks on PCs

    Genkin, D., Pachmanov, L., Pipman, I., Shamir, A. & Tromer, E., Jun 2016, In: Communications of the ACM. 59, 6, p. 70-79 10 p.

    Research output: Contribution to journalArticlepeer-review

    37 Scopus citations
  • Secure Association for the Internet of Things

    Benin, A., Toledo, S. & Tromer, E., 17 Feb 2016, Proceedings - 2015 International Workshop on Secure Internet of Things, SIoT 2015. Institute of Electrical and Electronics Engineers Inc., p. 25-34 10 p. 7411835. (Proceedings - 2015 International Workshop on Secure Internet of Things, SIoT 2015).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    4 Scopus citations
  • 2015

    Cluster computing in zero knowledge

    Chiesa, A., Tromer, E. & Virza, M., 2015, Advances in Cryptology - 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2015, Proceedings. Fischlin, M. & Oswald, E. (eds.). Springer Verlag, p. 371-403 33 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9057).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    28 Scopus citations
  • Get your hands off my laptop: physical side-channel key-extraction attacks on PCs: Extended version

    Genkin, D., Pipman, I. & Tromer, E., 5 Jun 2015, In: Journal of Cryptographic Engineering. 5, 2, p. 95-112 18 p.

    Research output: Contribution to journalArticlepeer-review

    75 Scopus citations
  • Path-Quality Monitoring in the Presence of Adversaries: The Secure Sketch Protocols

    Goldberg, S., Xiao, D., Tromer, E., Barak, B. & Rexford, J., Dec 2015, In: IEEE/ACM Transactions on Networking. 23, 6, p. 1729-1741 13 p., 6868307.

    Research output: Contribution to journalArticlepeer-review

    Open Access
    5 Scopus citations
  • Secure sampling of public parameters for succinct zero knowledge proofs

    Ben-Sasson, E., Chiesa, A., Green, M., Tromer, E. & Virza, M., 17 Jul 2015, Proceedings - 2015 IEEE Symposium on Security and Privacy, SP 2015. Institute of Electrical and Electronics Engineers Inc., p. 287-304 18 p. 7163032. (Proceedings - IEEE Symposium on Security and Privacy; vol. 2015-July).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    106 Scopus citations
  • Stealing keys from pcs using a radio: Cheap electromagnetic attacks on windowed exponentiation

    Genkin, D., Pachmanov, L., Pipman, I. & Tromer, E., 2015, Cryptographic Hardware and Embedded Systems - 17th International Workshop, CHES 2015, Proceedings. Güneysu, T. & Handschuh, H. (eds.). Springer Verlag, p. 207-228 22 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9293).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    110 Scopus citations
  • 2014

    Circuits resilient to additive attacks with applications to secure computation

    Genkin, D., Ishai, Y., Prabhakaran, M. M., Sahai, A. & Tromer, E., 2014, STOC 2014 - Proceedings of the 2014 ACM Symposium on Theory of Computing. Association for Computing Machinery, p. 495-504 10 p. (Proceedings of the Annual ACM Symposium on Theory of Computing).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    84 Scopus citations
  • 55 Scopus citations
  • Protecting circuits from computationally bounded and noisy leakage

    Faust, S., Rabin, T., Reyzin, L., Tromer, E. & Vaikuntanathan, V., 2014, In: SIAM Journal on Computing. 43, 5, p. 1564-1614 51 p.

    Research output: Contribution to journalArticlepeer-review

    Open Access
    12 Scopus citations
  • RSA key extraction via low-bandwidth acoustic cryptanalysis

    Genkin, D., Shamir, A. & Tromer, E., 2014, Advances in Cryptology, CRYPTO 2014 - 34th Annual Cryptology Conference, Proceedings. PART 1 ed. Springer Verlag, p. 444-461 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8616 LNCS, no. PART 1).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    236 Scopus citations
  • Scalable zero knowledge via cycles of elliptic curves

    Ben-Sasson, E., Chiesa, A., Tromer, E. & Virza, M., 2014, Advances in Cryptology, CRYPTO 2014 - 34th Annual Cryptology Conference, Proceedings. PART 2 ed. Springer Verlag, p. 276-294 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8617 LNCS, no. PART 2).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    103 Scopus citations
  • Succinct non-interactive zero knowledge for a von neumann architecture

    Ben-Sasson, E., Chiesa, A., Tromer, E. & Virza, M., 2014, Proceedings of the 23rd USENIX Security Symposium. USENIX Association, p. 781-796 16 p. (Proceedings of the 23rd USENIX Security Symposium).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    488 Scopus citations
  • Zerocash: Decentralized anonymous payments from bitcoin

    Ben-Sasson, E., Chiesa, A., Garman, C., Green, M., Miers, I., Tromer, E. & Virza, M., 13 Nov 2014, Proceedings - IEEE Symposium on Security and Privacy. Institute of Electrical and Electronics Engineers Inc., p. 459-474 16 p. 6956581. (Proceedings - IEEE Symposium on Security and Privacy).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    1462 Scopus citations
  • 2013

    Analyzing Unique-Bid Auction Sites for Fun and Profit

    Samorodnitzky, O., Tromer, E. & Wool, A., 2013.

    Research output: Contribution to conferencePaperpeer-review

    1 Scopus citations
  • Fast reductions from RAMs to delegatable succinct constraint satisfaction problems

    Ben-Sasson, E., Chiesa, A., Genkin, D. & Tromer, E., 2013, ITCS 2013 - Proceedings of the 2013 ACM Conference on Innovations in Theoretical Computer Science. p. 401-413 13 p. (ITCS 2013 - Proceedings of the 2013 ACM Conference on Innovations in Theoretical Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    64 Scopus citations
  • On the concrete efficiency of probabilistically-checkable proofs

    Ben-Sasson, E., Chiesa, A., Genkin, D. & Tromer, E., 2013, STOC 2013 - Proceedings of the 2013 ACM Symposium on Theory of Computing. p. 585-594 10 p. (Proceedings of the Annual ACM Symposium on Theory of Computing).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    56 Scopus citations
  • Recursive composition and bootstrapping for SNARKs and proof-carrying data

    Bitansky, N., Canetti, R., Chiesa, A. & Tromer, E., 2013, STOC 2013 - Proceedings of the 2013 ACM Symposium on Theory of Computing. p. 111-120 10 p. (Proceedings of the Annual ACM Symposium on Theory of Computing).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    207 Scopus citations
  • SNARKs for C: Verifying program executions succinctly and in zero knowledge

    Ben-Sasson, E., Chiesa, A., Genkin, D., Tromer, E. & Virza, M., 2013, Advances in Cryptology, CRYPTO 2013 - 33rd Annual Cryptology Conference, Proceedings. PART 2 ed. p. 90-108 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8043 LNCS, no. PART 2).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    389 Scopus citations
  • 2012

    From extractable collision resistance to succinct non-interactive arguments of knowledge, and back again

    Bitansky, N., Canetti, R., Chiesa, A. & Tromer, E., 2012, ITCS 2012 - Innovations in Theoretical Computer Science Conference. p. 326-349 24 p. (ITCS 2012 - Innovations in Theoretical Computer Science Conference).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    357 Scopus citations