Eran Tromer

Professor

20022024

Research activity per year

Filter
Conference contribution

Search results

  • 2024

    Group Oblivious Message Retrieval

    Liu, Z., Tromer, E. & Wang, Y., 2024, Proceedings - 45th IEEE Symposium on Security and Privacy, SP 2024. Institute of Electrical and Electronics Engineers Inc., p. 4367-4385 19 p. (Proceedings - IEEE Symposium on Security and Privacy).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • PerfOMR: Oblivious Message Retrieval with Reduced Communication and Computation

    Liu, Z., Tromer, E. & Wang, Y., 2024, Proceedings of the 33rd USENIX Security Symposium. USENIX Association, p. 3169-3186 18 p. (Proceedings of the 33rd USENIX Security Symposium).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Scopus citations
  • ZKSMT: A VM for Proving SMT Theorems in Zero Knowledge

    Luick, D., Kolesar, J. C., Antonopoulos, T., Harris, W. R., Parker, J., Piskac, R., Tromer, E., Wang, X. & Luo, N., 2024, Proceedings of the 33rd USENIX Security Symposium. USENIX Association, p. 3837-3854 18 p. (Proceedings of the 33rd USENIX Security Symposium).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Scopus citations
  • 2023

    Cheesecloth: Zero-Knowledge Proofs of Real-World Vulnerabilities

    Cuéllar, S., Harris, B., Parker, J., Pernsteiner, S. & Tromer, E., 2023, 32nd USENIX Security Symposium, USENIX Security 2023. USENIX Association, p. 6525-6540 16 p. (32nd USENIX Security Symposium, USENIX Security 2023; vol. 9).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    4 Scopus citations
  • Optical Cryptanalysis: Recovering Cryptographic Keys from Power LED Light Fluctuations

    Nassi, B., Vayner, O., Iluz, E., Nassi, D., Jancar, J., Genkin, D., Tromer, E., Zadov, B. & Elovici, Y., 15 Nov 2023, CCS 2023 - Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, Inc, p. 268-280 13 p. (CCS 2023 - Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    3 Scopus citations
  • Squint Hard Enough: Attacking Perceptual Hashing with Adversarial Machine Learning

    Prokos, J., Fendley, N., Green, M., Schuster, R., Tromer, E., Jois, T. M. & Cao, Y., 2023, 32nd USENIX Security Symposium, USENIX Security 2023. USENIX Association, p. 211-228 18 p. (32nd USENIX Security Symposium, USENIX Security 2023; vol. 1).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    6 Scopus citations
  • 2022

    Formalizing Human Ingenuity: A Quantitative Framework for Copyright Law's Substantial Similarity

    Scheffler, S., Tromer, E. & Varia, M., 1 Nov 2022, CSLAW 2022 - Proceedings of the 2022 Symposium on Computer Science and Law. Association for Computing Machinery, Inc, p. 37-49 13 p. (CSLAW 2022 - Proceedings of the 2022 Symposium on Computer Science and Law).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    6 Scopus citations
  • Lend Me Your Ear: Passive Remote Physical Side Channels on PCs

    Genkin, D., Nissan, N., Schuster, R. & Tromer, E., 2022, Proceedings of the 31st USENIX Security Symposium, Security 2022. USENIX Association, p. 4437-4454 18 p. (Proceedings of the 31st USENIX Security Symposium, Security 2022).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    10 Scopus citations
  • Oblivious Message Retrieval

    Liu, Z. & Tromer, E., 2022, Advances in Cryptology – CRYPTO 2022 - 42nd Annual International Cryptology Conference, CRYPTO 2022, Proceedings. Dodis, Y. & Shrimpton, T. (eds.). Springer Science and Business Media Deutschland GmbH, p. 753-783 31 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13507 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    12 Scopus citations
  • Plumo: An Ultralight Blockchain Client

    Vesely, P., Gurkan, K., Straka, M., Gabizon, A., Jovanovic, P., Konstantopoulos, G., Oines, A., Olszewski, M. & Tromer, E., 2022, Financial Cryptography and Data Security - 26th International Conference, FC 2022, Revised Selected Papers. Eyal, I. & Garay, J. (eds.). Springer Science and Business Media Deutschland GmbH, p. 597-614 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13411 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    5 Scopus citations
  • Proving UNSAT in Zero Knowledge

    Luo, N., Antonopoulos, T., Harris, W. R., Piskac, R., Tromer, E. & Wang, X., 7 Nov 2022, CCS 2022 - Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 2203-2217 15 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    9 Scopus citations
  • Unclonable Polymers and Their Cryptographic Applications

    Almashaqbeh, G., Canetti, R., Erlich, Y., Gershoni, J., Malkin, T., Pe’er, I., Roitburd-Berman, A. & Tromer, E., 2022, Advances in Cryptology – EUROCRYPT 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, 2022, Proceedings. Dunkelman, O. & Dziembowski, S. (eds.). Springer Science and Business Media Deutschland GmbH, p. 759-789 31 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13275 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    2 Scopus citations
  • 2021

    You autocomplete me: Poisoning vulnerabilities in neural code completion

    Schuster, R., Song, C., Tromer, E. & Shmatikov, V., 2021, Proceedings of the 30th USENIX Security Symposium. USENIX Association, p. 1559-1575 17 p. (Proceedings of the 30th USENIX Security Symposium).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    75 Scopus citations
  • 2019

    Synesthesia: Detecting screen content via remote acoustic side channels

    Genkin, D., Pattani, M., Schuster, R. & Tromer, E., May 2019, Proceedings - 2019 IEEE Symposium on Security and Privacy, SP 2019. Institute of Electrical and Electronics Engineers Inc., p. 853-869 17 p. 8835386. (Proceedings - IEEE Symposium on Security and Privacy; vol. 2019-May).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    49 Scopus citations
  • 2018

    Drive-by key-extraction cache attacks from portable code

    Genkin, D., Pachmanov, L., Tromer, E. & Yarom, Y., 2018, Applied Cryptography and Network Security - 16th International Conference, ACNS 2018, Proceedings. Preneel, B. & Vercauteren, F. (eds.). Springer Verlag, p. 83-102 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10892 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    37 Scopus citations
  • Situational access control in the internet of things

    Schuster, R., Shmatikov, V. & Tromer, E., 15 Oct 2018, CCS 2018 - Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 1056-1073 18 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    72 Scopus citations
  • 2017

    Beauty and the burst: Remote identification of encrypted video streams

    Schuster, R., Shmatikov, V. & Tromer, E., 2017, Proceedings of the 26th USENIX Security Symposium. USENIX Association, p. 1357-1374 18 p. (Proceedings of the 26th USENIX Security Symposium).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    156 Scopus citations
  • Computational integrity with a public random string from quasi-linear PCPs

    Ben-Sasson, E., Bentov, I., Chiesa, A., Gabizon, A., Genkin, D., Hamilis, M., Pergament, E., Riabzev, M., Silberstein, M., Tromer, E. & Virza, M., 2017, Advances in Cryptology – EUROCRYPT 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. Coron, J.-S. & Nielsen, J. B. (eds.). Springer Verlag, p. 551-579 29 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10212 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    36 Scopus citations
  • 2016

    DroidDisintegrator: Intra-application information flow control in android apps

    Tromer, E. & Schuster, R., 30 May 2016, ASIA CCS 2016 - Proceedings of the 11th ACM Asia Conference on Computer and Communications Security. Association for Computing Machinery, Inc, p. 401-412 12 p. (ASIA CCS 2016 - Proceedings of the 11th ACM Asia Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    13 Scopus citations
  • ECDH key-extraction via low-bandwidth electromagnetic attacks on PCs

    Genkin, D., Pachmanov, L., Pipman, I. & Tromer, E., 2016, Topics in Cryptology - The Cryptographers Track at the RSA Conference, CT-RSA 2016. Sako, K. (ed.). Springer Verlag, p. 219-235 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9610).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    56 Scopus citations
  • ECDSA key extraction from mobile devices via nonintrusive physical side channels

    Genkin, D., Pachmanov, L., Pipman, I., Tromer, E. & Yarom, Y., 24 Oct 2016, CCS 2016 - Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 1626-1638 13 p. (Proceedings of the ACM Conference on Computer and Communications Security; vol. 24-28-October-2016).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    142 Scopus citations
  • Fast multiplication in binary fields on GPUs via register cache

    Ben-Sasson, E., Hamilis, M., Silberstein, M. & Tromer, E., 1 Jun 2016, Proceedings of the 2016 International Conference on Supercomputing, ICS 2016. Association for Computing Machinery, a35. (Proceedings of the International Conference on Supercomputing; vol. 01-03-June-2016).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    16 Scopus citations
  • PhotoProof: Cryptographic Image Authentication for Any Set of Permissible Transformations

    Naveh, A. & Tromer, E., 16 Aug 2016, Proceedings - 2016 IEEE Symposium on Security and Privacy, SP 2016. Institute of Electrical and Electronics Engineers Inc., p. 255-271 17 p. 7546506. (Proceedings - 2016 IEEE Symposium on Security and Privacy, SP 2016).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    50 Scopus citations
  • Secure Association for the Internet of Things

    Benin, A., Toledo, S. & Tromer, E., 17 Feb 2016, Proceedings - 2015 International Workshop on Secure Internet of Things, SIoT 2015. Institute of Electrical and Electronics Engineers Inc., p. 25-34 10 p. 7411835. (Proceedings - 2015 International Workshop on Secure Internet of Things, SIoT 2015).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    4 Scopus citations
  • 2015

    Cluster computing in zero knowledge

    Chiesa, A., Tromer, E. & Virza, M., 2015, Advances in Cryptology - 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2015, Proceedings. Fischlin, M. & Oswald, E. (eds.). Springer Verlag, p. 371-403 33 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9057).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    28 Scopus citations
  • Secure sampling of public parameters for succinct zero knowledge proofs

    Ben-Sasson, E., Chiesa, A., Green, M., Tromer, E. & Virza, M., 17 Jul 2015, Proceedings - 2015 IEEE Symposium on Security and Privacy, SP 2015. Institute of Electrical and Electronics Engineers Inc., p. 287-304 18 p. 7163032. (Proceedings - IEEE Symposium on Security and Privacy; vol. 2015-July).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    106 Scopus citations
  • Stealing keys from pcs using a radio: Cheap electromagnetic attacks on windowed exponentiation

    Genkin, D., Pachmanov, L., Pipman, I. & Tromer, E., 2015, Cryptographic Hardware and Embedded Systems - 17th International Workshop, CHES 2015, Proceedings. Güneysu, T. & Handschuh, H. (eds.). Springer Verlag, p. 207-228 22 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9293).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    110 Scopus citations
  • 2014

    Circuits resilient to additive attacks with applications to secure computation

    Genkin, D., Ishai, Y., Prabhakaran, M. M., Sahai, A. & Tromer, E., 2014, STOC 2014 - Proceedings of the 2014 ACM Symposium on Theory of Computing. Association for Computing Machinery, p. 495-504 10 p. (Proceedings of the Annual ACM Symposium on Theory of Computing).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    84 Scopus citations
  • RSA key extraction via low-bandwidth acoustic cryptanalysis

    Genkin, D., Shamir, A. & Tromer, E., 2014, Advances in Cryptology, CRYPTO 2014 - 34th Annual Cryptology Conference, Proceedings. PART 1 ed. Springer Verlag, p. 444-461 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8616 LNCS, no. PART 1).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    236 Scopus citations
  • Scalable zero knowledge via cycles of elliptic curves

    Ben-Sasson, E., Chiesa, A., Tromer, E. & Virza, M., 2014, Advances in Cryptology, CRYPTO 2014 - 34th Annual Cryptology Conference, Proceedings. PART 2 ed. Springer Verlag, p. 276-294 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8617 LNCS, no. PART 2).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    103 Scopus citations
  • Succinct non-interactive zero knowledge for a von neumann architecture

    Ben-Sasson, E., Chiesa, A., Tromer, E. & Virza, M., 2014, Proceedings of the 23rd USENIX Security Symposium. USENIX Association, p. 781-796 16 p. (Proceedings of the 23rd USENIX Security Symposium).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    488 Scopus citations
  • Zerocash: Decentralized anonymous payments from bitcoin

    Ben-Sasson, E., Chiesa, A., Garman, C., Green, M., Miers, I., Tromer, E. & Virza, M., 13 Nov 2014, Proceedings - IEEE Symposium on Security and Privacy. Institute of Electrical and Electronics Engineers Inc., p. 459-474 16 p. 6956581. (Proceedings - IEEE Symposium on Security and Privacy).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    1463 Scopus citations
  • 2013

    Fast reductions from RAMs to delegatable succinct constraint satisfaction problems

    Ben-Sasson, E., Chiesa, A., Genkin, D. & Tromer, E., 2013, ITCS 2013 - Proceedings of the 2013 ACM Conference on Innovations in Theoretical Computer Science. p. 401-413 13 p. (ITCS 2013 - Proceedings of the 2013 ACM Conference on Innovations in Theoretical Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    64 Scopus citations
  • On the concrete efficiency of probabilistically-checkable proofs

    Ben-Sasson, E., Chiesa, A., Genkin, D. & Tromer, E., 2013, STOC 2013 - Proceedings of the 2013 ACM Symposium on Theory of Computing. p. 585-594 10 p. (Proceedings of the Annual ACM Symposium on Theory of Computing).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    56 Scopus citations
  • Recursive composition and bootstrapping for SNARKs and proof-carrying data

    Bitansky, N., Canetti, R., Chiesa, A. & Tromer, E., 2013, STOC 2013 - Proceedings of the 2013 ACM Symposium on Theory of Computing. p. 111-120 10 p. (Proceedings of the Annual ACM Symposium on Theory of Computing).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    207 Scopus citations
  • SNARKs for C: Verifying program executions succinctly and in zero knowledge

    Ben-Sasson, E., Chiesa, A., Genkin, D., Tromer, E. & Virza, M., 2013, Advances in Cryptology, CRYPTO 2013 - 33rd Annual Cryptology Conference, Proceedings. PART 2 ed. p. 90-108 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8043 LNCS, no. PART 2).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    390 Scopus citations
  • 2012

    From extractable collision resistance to succinct non-interactive arguments of knowledge, and back again

    Bitansky, N., Canetti, R., Chiesa, A. & Tromer, E., 2012, ITCS 2012 - Innovations in Theoretical Computer Science Conference. p. 326-349 24 p. (ITCS 2012 - Innovations in Theoretical Computer Science Conference).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    359 Scopus citations
  • Multiparty computation with low communication, computation and interaction via threshold FHE

    Asharov, G., Jain, A., López-Alt, A., Tromer, E., Vaikuntanathan, V. & Wichs, D., 2012, Advances in Cryptology, EUROCRYPT 2012 - 31st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. Springer Verlag, p. 483-501 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7237 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    280 Scopus citations
  • On-the-fly multiparty computation on the cloud via multikey fully homomorphic encryption

    López-Alt, A., Tromer, E. & Vaikuntanathan, V., 2012, STOC '12 - Proceedings of the 2012 ACM Symposium on Theory of Computing. p. 1219-1234 16 p. (Proceedings of the Annual ACM Symposium on Theory of Computing).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    714 Scopus citations
  • 2010

    Protecting circuits from leakage: The computationally-bounded and noisy cases

    Faust, S., Rabin, T., Reyzin, L., Tromer, E. & Vaikuntanathan, V., 2010, Advances in Cryptology - Eurocrypt 2010, 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. p. 135-156 22 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6110 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    106 Scopus citations
  • 2009

    Hey, you, get off of my cloud: Exploring information leakage in third-party compute clouds

    Ristenpart, T., Tromer, E., Shacham, H. & Savage, S., 2009, CCS'09 - Proceedings of the 16th ACM Conference on Computer and Communications Security. p. 199-212 14 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1674 Scopus citations
  • Noninterference for a practical DIFC-based operating system

    Tromer, E. & Krohn, M., 2009, 2009 30th IEEE Symposium on Security and Privacy. p. 61-76 16 p. 5207637. (Proceedings - IEEE Symposium on Security and Privacy).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    53 Scopus citations
  • 2008

    Path-quality monitoring in the presence of adversaries

    Goldberg, S., Xiao, D., Tromer, E., Barak, B. & Rexford, J., 2008, SIGMETRICS'08: Proceedings of the 2008 ACM SIGMETRICS International Conference on Measurement and Modeling of Computer Systems. 1 SPECIAL ISSUE ed. p. 193-204 12 p. (SIGMETRICS'08: Proceedings of the 2008 ACM SIGMETRICS International Conference on Measurement and Modeling of Computer Systems; vol. 36, no. 1 SPECIAL ISSUE).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    62 Scopus citations
  • 2005

    Improved routing-based linear algebra for the number field sieve

    Geiselmann, W., Köpfer, H., Steinwandt, R. & Tromer, E., 2005, Proceedings ITCC 2005 - International Conference on Information Technology: Coding and Computing. Institute of Electrical and Electronics Engineers Inc., p. 636-641 6 p. (International Conference on Information Technology: Coding and Computing, ITCC; vol. 1).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    6 Scopus citations
  • 2002

    Analysis of bernstein’s factorization circuit

    Lenstra, A. K., Shamir, A., Tomlinson, J. & Tromer, E., 2002, Advances in Cryptology - ASIACRYPT 2002 - 8th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. Zheng, Y. (ed.). Springer Verlag, p. 1-26 26 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2501).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    20 Scopus citations