(Within each topic, in reverse chronological order)
Ben Nassi, Ofek Vayner, Etay Iluz, Dudi Nassi, Or Hai Cohen, Jan Jancar, Daniel Genkin, Eran Tromer, Boris Zadov, Yuval Elovici,
Optical cryptanalysis: recovering cryptographic keys from power LED light fluctuations
proc. ACM Conference on Computer and Communications Security (CCS) 2023, 268-280 ACM, 2023
Daniel Genkin, Noam Nissan, Roei Schuster, Eran Tromer,
Lend me your ear: passive remote physical side channels on PCs
proc. USENIX Security 2022
Daniel Genkin, Mihir Pattani, Roei Schuster, Eran Tromer,
Synesthesia: Detecting Screen Content via Remote Acoustic Side Channels
proc. IEEE Symposium on Security & Privacy (S&P) 2019, 853-869, IEEE, 2019
Daniel Genkin, Lev Pachmanov, Eran Tromer, Yuval Yarom,
Drive-by Key-Extraction Cache Attacks from Portable Code
proc. Applied Cryptography and Network Security (ACNS) 2018), LNCS 10892, 83-102, Springer, 2018
Roei Schuster, Vitaly Shmatikov, Eran Tromer,
Beauty and the Burst: remote identification of encrypted video streams,
proc. USENIX Security 2017, 1357-1374, USENIX, 2017
Daniel Genkin, Lev Pachmanov, Itamar Pipman, Adi Shamir, Eran Tromer, Yuval Yarom,
Physical key extraction attacks on PCs,
Communications of the ACM, vol. 59 no. 6, 70-79, 2016
Daniel Genkin, Lev Pachmanov, Itamar Pipman, Eran Tromer, Yuval Yarom,
ECDSA key extraction from mobile devices via nonintrusive physical side channels,
proc. ACM Conference on Computer and Communications Security (CCS) 2016, 1626-1638, 2016
Daniel Genkin, Lev Pachmanov, Itamar Pipman, Eran Tromer,
ECDH key-extraction via low-bandwidth electromagnetic attacks on PCs,
proc. RSA Conference Cryptographers' Track (CT-RSA) 2016, LNCS 9610, 219-235, Springer, 2016
Daniel Genkin, Lev Pachmanov, Itamar Pipman, Eran Tromer,
Stealing keys from PCs using a radio: cheap electromagnetic attacks on windowed exponentiation,
proc. Workshop on Cryptographic Hardware and Embedded Systems (CHES) 2015, LNCS 9293, 207--228, Springer, 2015
Daniel Genkin, Itamar Pipman, Eran Tromer,
Get your hands off my laptop: physical side-channel key-extraction attacks on PCs (extended version),
Journal of Cryptographic Engineering, vol. 5 no. 2, 95--112, 2015
Daniel Genkin, Itamar Pipman, Eran Tromer,
Get your hands off my laptop: physical side-channel key-extraction attacks on PCs,
proc. Workshop on Cryptographic Hardware and Embedded Systems (CHES) 2014, LNCS 8731, 242-260, Springer, 2014
◆ Selected by the PC as one of the conference's 3 top papers
Daniel Genkin, Adi Shamir, Eran Tromer,
RSA key extraction via low-bandwidth acoustic cryptanalysis,
proc. CRYPTO 2014, part I, LNCS 8616, 444-461, Springer, 2014
◆ Black Hat 2014 Pwnie Award for Most Innovative Research
◆ Chosen by the PC as one of the conference's 3 top papers
Eran Tromer, Dag Arne Osvik, Adi Shamir,
Efficient cache attacks on AES, and countermeasures,
Journal of Cryptology, vol. 23 no. 1, 37-71, Springer, 2010
Thomas Ristenpart, Eran Tromer, Hovav Shacham, Stefan Savage,
Hey, you, get off of my cloud! Exploring information leakage in third-party compute clouds,
proc. ACM Conference on Computer and Communications Security (CCS) 2009, 199-212, ACM, 2009
◆ awarded ACM CCS Test-of-Time Award
Dag Arne Osvik, Adi Shamir, Eran Tromer,
Cache attacks and countermeasures: the case of AES,
proc. RSA Conference Cryptographers' Track (CT-RSA) 2006, LNCS 3860, 1-20, Springer, 2006
Zeyu Liu, Katerina Sotiraki, Eran Tromer, Yunhao Wang,
DoS-resistant oblivious message retrieval from snake-eye resistant PKE,
preprint
Zeyu Liu, Eran Tromer, Yunhao Wang,
PerfOMR: oblivious message retrieval with reduced communication and computation,
proc. USENIX Security 2024, to appear
Group oblivious message retrieval,
proc. IEEE Symposium on Security & Privacy (S&P) 2024, to appear
Shlomit Azgad-Tromer, Joey Garcia Eran Tromer,
The case for on chain privacy and compliance
Stanford Journal of Blockchain Law & Policy, Vol. 6, No. 2, 2023
Oblivious message retrieval,
proc. CRYPTO 2022, part 1, LNCS 13507, 753-783, Springer, 2022
Psi Vesely, Michael Straka, Philipp Jovanovic, Ariel Gabizon, Kobi Gurkan, Georgios Konstantopoulos, Asa Oines, Marek Olszewski, Eran Tromer
Plumo: An Ultralight Blockchain Client,
proc. Financial Cryptography and Data Security (FC) 2022, to appear
Early version at ZKProof Standardization Workshop 2020
Ghada Almashaqbeh, Fabrice Benhamouda, Seungwook Han, Daniel Jaroslawicz, Tal Malkin, Alex Nicita, Tal Rabin, Abhishek Shah, Eran Tromer,
Gage MPC: bypassing residual function leakage for non-interactive MPC,
Proceedings on Privacy Enhancing Technologies Symposium (PoPETS) 2021, vol.~4, 528--548, 2021
Eli Ben-Sasson, Alessandro Chiesa, Christina Garman, Matthew Green, Ian Miers, Eran Tromer, Madars Virza,
Zerocash: decentralized anonymous payments from Bitcoin,
proc. IEEE Symposium on Security & Privacy (S&P) 2014, 459-474, IEEE, 2014
Ory Samorodnitzky, Eran Tromer, Avishai Wool,
Analyzing unique-bid auction sites for fun and profit,
proc. Network & Distributed System Security Symposium (NDSS) 2013, 2013
Daniel Luick, John Kolesar, Timos Antonopoulos, William R. Harris, James Parker, Ruzica Piskac, Eran Tromer, Xiao Wang, Ning Luo
ZKSMT: a VM for proving SMT theorems in zero knowledge
Santiago Cuéllar, Bill Harris, James Parker, Stuart Pernsteiner, Eran Tromer,
Cheesecloth: zero-knowledge proofs of real-world vulnerabilities
proc. USENIX Security 2023, 6525-6540
Ning Luo, Timos Antonopoulos, William Harris, Ruzica Piskac, Eran Tromer, Xiao Wang.
Proving UNSAT in zero knowledge
proc. ACM Conference on Computer and Communications Security (CCS) 2022
◆ ACM CCS 2022 Distinguished Paper Award
Plumo: An Ultralight Blockchain Client
Eli Ben-Sasson, Iddo Ben-Tov, Alessandro Chiesa, Ariel Gabizon, Daniel Genkin, Matan Hamilis, Evgenya Pergament, Michael Riabzev, Mark Silberstein, Eran Tromer, Madars Virza,
Computational integrity with a public random string from quasi-linear PCPs
proc. Eurocrypt 2017, LNCS 10212, 551-579, 2017
Eli Ben-Sasson, Alessandro Chiesa, Eran Tromer, Madars Virza,
Scalable zero knowledge via cycles of elliptic curves (extended version),
Algorithmica, vol. 79, no. 4, 1102–1160, Springer, 2017
Assa Naveh, Eran Tromer,
PhotoProof: cryptographic image authentication for any set of permissible transformations,
proc. IEEE Symposium on Security & Privacy (S&P) 2016, 255-271, IEEE, 2016
Nir Bitansky, Ran Canetti, Alessandro Chiesa, Shafi Goldwasser, Huijia Lin, Aviad Rubinstein, Eran Tromer,
The hunting of the SNARK,
Journal of Cryptology, vol. 30, no. 4, 989-1066, Springer, 2017
Eli Ben-Sasson, Alessandro Chiesa, Matthew Green, Eran Tromer, Madars Virza,
Secure sampling of public parameters for succinct zero knowledge proofs,
proc. IEEE Symposium on Security & Privacy (S&P) 2015, 287-304, IEEE, 2015
Alessandro Chiesa, Eran Tromer, Madars Virza,
Cluster computing in zero knowledge,
proc. Eurocrypt 2015, vol. 2, LNCS 9057, 371-403, Springer, 2015
Eli Ben-Sasson, Alessandro Chiesa, Eran Tromer, Madars Virza,
Scalable zero knowledge via cycles of elliptic curves,
proc. CRYPTO 2014, part II, LNCS 8617, 276-294, Springer, 2014
Eli Ben-Sasson, Alessandro Chiesa, Eran Tromer, Madars Virza,
Succinct non-interactive zero knowledge for a von Neumann architecture,
proc. USENIX Security 2014, 781-796, USENIX, 2014
Stephen Chong, Eran Tromer, Jeffrey A. Vaughan,
Enforcing language semantics using proof-carrying data,
preprint, 2013
Eli Ben-Sasson, Alessandro Chiesa, Daniel Genkin, Eran Tromer, Madars Virza,
SNARKs for C: verifying program executions succinctly and in zero knowledge,
proc. CRYPTO 2013, vol. 2, LNCS 8043, 90-108, Springer, 2013
Eli Ben-Sasson, Alessandro Chiesa, Daniel Genkin, Eran Tromer,
On the concrete efficiency of probabilistically-checkable proofs,
proc. Symposium on Theory of Computing (STOC) 2013, 585-594, ACM, 2013
Nir Bitansky, Ran Canetti, Alessandro Chiesa, Eran Tromer,
Recursive composition and bootstrapping for SNARKs and proof-carrying data,
proc. Symposium on Theory of Computing (STOC) 2013, 111-120, ACM, 2013
Eli Ben-Sasson, Alessandro Chiesa, Daniel Genkin, Eran Tromer,
Fast reductions from RAMs to delegatable succinct constraint satisfaction problems,
proc. Innovations in Theoretical Computer Science (ITCS) 2013, 401-414, ACM, 2013
Alessandro Chiesa, Eran Tromer,
Proof-carrying data: secure computation on untrusted platforms,
The Next Wave, vol. 19 no. 2, National Security Agency, 2012
Nir Bitansky, Ran Canetti, Alessandro Chiesa, Eran Tromer,
From extractable collision resistance to succinct non-interactive arguments of knowledge, and back again,
proc. Innovations in Computer Science (ITCS) 2012, 326-349, ACM, 2012
Alessandro Chiesa, Eran Tromer,
Proof-carrying data and hearsay arguments from signature cards,
proc. Innovations in Theoretical Computer Science (ITCS) 2010, 310-331, Tsinghua University Press, 2010
Jonathan Prokos, Neil Fendley, Matthew Green, Roei Schuster, Eran Tromer, Tushar Jois, Yinzhi Cao,
Squint hard enough: attacking perceptual hashing with adversarial machine learning,
proc. USENIX Security 2023, to appear
Roei Schuster, Congzheng Song, Eran Tromer, Vitaly Shmatikov,
You autocomplete me: poisoning vulnerabilities in neural code completion,
proc. USENIX Security 2021, 1559--1575, 2021
◆ USENIX Security Distinguished Paper Award
Shai Shalev-Shwartz, Ohad Shamir, Eran Tromer,
Using more data to speed-up training time,
proc. International Conference on Artificial Intelligence and Statistics (AISTATS) 2012, Journal of Machine Learning Research, vol. 22, 1019-1027, Microtome Publishing, 2012
Ghada Almashaqbeh, Ran Canetti, Yaniv Erlich, Jonathan Gershoni, Tal Malkin, Itsik Pe'er, Anna Roitburd-Berman, Eran Tromer,
Unclonable polymers and their cryptographic applications,
proc. Eurocrypt 2022, 229–242, LNCS 13275, Springer, 2022
Eli Ben Sasson, Matan Hamilis, Mark Silberstein, Eran Tromer,
Fast multiplication in binary fields on GPUs via register cache,
International Conference on Supercomputing (ICS) 2016, ACM, 2016
Willi Geiselmann, Adi Shamir, Rainer Steinwandt, Eran Tromer,
Fault-tolerance in hardware for sparse systems of linear equations, with applications to integer factorization,
Chapter 8 in N. Nedjah, L. de Macedo Mourelle (Eds.), New Trends in Cryptographic Systems, Nova Science Publishers, 2006
Willi Geiselmann, Adi Shamir, Rainer Steinwandt, Eran Tromer,
Scalable Hardware for Sparse Systems of Linear Equations, with Applications to Integer Factorization,
proc. Workshop on Cryptographic Hardware and Embedded Systems (CHES) 2005, LNCS 3659, 131-146, Springer, 2005
Willi Geiselmann, Adi Shamir, Rainer Steinwandt, Eran Tromer,
A systolic design for supporting Wiedemann's algorithm,
invited paper, proc. Workshop on Special Purpose Hardware for Attacking Cryptographic Systems (SHARCS), 13-17, 2005
Adi Shamir, Eran Tromer,
Special-purpose hardware for factoring: the NFS sieving step,
proc. Workshop on Special Purpose Hardware for Attacking Cryptographic Systems (SHARCS), 1-12, 2005
Willi Geiselmann, Hubert Köpfer, Rainer Steinwandt, Eran Tromer,
Improved routing-based linear algebra for the number field sieve,
proc. International Conference on Information Technology: Coding and Computing (ITCC'05), Volume 1, 636-641, IEEE, 2005
Arjen K. Lenstra, Eran Tromer, Adi Shamir, Wil Kortsmit, Bruce Dodson, James Hughes, Paul Leyland,
Factoring estimates for a 1024-bit RSA modulus, proc. Asiacrypt 2003, LNCS 2894, 331-346, Springer, 2003
Adi Shamir, Eran Tromer,
On the cost of factoring RSA-1024,
RSA CryptoBytes, vol. 6 no. 2, 10-19, 2003
Adi Shamir, Eran Tromer,
Factoring large numbers with the TWIRL device,
proc. CRYPTO 2003, LNCS 2729, 1-26, Springer, 2003
Arjen K. Lenstra, Adi Shamir, Jim Tomlinson, Eran Tromer,
Analysis of Bernstein's factorization circuit,
proc. Asiacrypt 2002, LNCS 2501, 1-26, Springer, 2002
Roei Schuster, Vitaly Shmatikov, Eran Tromer,
Situational Access Control in the Internet of Things,
proc. ACM Conference on Computer and Communications Security (CCS) 2018, 1056-1073, ACM, 2018
Roei Schuster, Eran Tromer,
DroidDisintegrator: intra-application information flow control in Android apps,
proc. ACM Symposium on Information, Computer and Communications Security (ASIACCS) 2016, 401-412, ACM, 2016
Almog Benin, Sivan Toledo, Eran Tromer,
Secure association for the Internet of Things,
proc. International Workshop on Secure Internet of Things (SIoT) 2015, 25-34, IEEE, 2015
Sharon Goldberg, David Xiao, Eran Tromer, Boaz Barak, Jennifer Rexford,
Path-quality monitoring in the presence of adversaries: the secure sketch protocol,
IEEE/ACM Transactions on Networking, vol. 23 no. 6, 1729--1741, 2015
Maxwell Krohn, Eran Tromer,
Non-interference for a practical DIFC-based operating system,
proc. IEEE Symposium on Security and Privacy (S&P) 2009, 61-76, IEEE, 2009
Sharon Goldberg, David Xiao, Eran Tromer, Boaz Barak, Jennifer Rexford,
Path-quality monitoring in the presence of adversaries,
proc. SIGMETRICS 2008, 193-204, ACM, 2008
Adriana López-Alt, Eran Tromer, Vinod Vaikuntanathan,
Multikey fully homomorphic encryption and MPC on the cloud,
SIAM Journal on Computing (SICOMP), vol.46 no.6, 1827-1892, 2007
Sebastian Faust, Tal Rabin, Leonid Reyzin, Eran Tromer, Vinod Vaikuntanathan,
Protecting circuits from computationally bounded and noisy leakage,
SIAM Journal on Computing (SICOMP), vol. 43 no. 5 pp. 1564-1614, 2014
Daniel Genkin, Yuval Ishai, Manoj M. Prabhakaran, Amit Sahai, Eran Tromer,
Circuits resilient to additive attacks with applications to secure computation,
proc. Symposium on Theory of Computing (STOC) 2014, 495-504, ACM, 2014
Adriana López-Alt, Eran Tromer, Vinod Vaikuntanathan,
On-the-fly multiparty computation on the cloud via multikey fully homomorphic encryption,
proc. Symposium on Theory of Computing (STOC) 2012, 1219-1234, ACM, 2012
Gilad Asharov, Abhishek Jain, Adriana López-Alt, Eran Tromer, Vinod Vaikuntanathan, Daniel Wichs,
Multiparty computation with low communication, computation and interaction via threshold FHE,
proc. Eurocrypt 2012, LNCS 7237, 483-501, 2012
Sebastian Faust, Tal Rabin, Leonid Reyzin, Eran Tromer, Vinod Vaikuntanathan,
Protecting circuits from leakage: the computationally-bounded and noisy cases,
proc. Eurocrypt 2010, LNCS 6110, 135-156, Springer, 2010
Boaz Barak, Ronen Shaltiel, Eran Tromer,
True random number generators secure in a changing environment,
proc. Workshop on Cryptographic Hardware and Embedded Systems (CHES) 2003, LNCS 2779, 166-180, Springer, 2003
Squint hard enough: attacking perceptual hashing with adversarial machine learning
(see above)
Ronald L. Rivest, Benjamin Agre, Daniel V. Bailey, Christopher Crutchfield, Yevgeniy Dodis, Kermin Elliott Fleming, Asif Khan, Jayant Krishnamurthy, Yuncheng Lin, Leo Reyzin, Emily Shen, Jim Sukha, Drew Sutherland, Eran Tromer, Yiqun Lisa Yin,
The MD6 hash function — a proposal to NIST for SHA-3,
submission to the National Institute of Standards and Technology hash function competition, 2008
Ran Canetti, Ron Rivest, Eran Tromer,
Comments on NIST draft requirements and criteria for hash algorithm,
letter to the National Institute of Standards and Technology, April 2007
Moni Naor, Asaf Nussboim, Eran Tromer,
Efficiently constructible huge graphs that preserve first order properties of random graphs,
proc. Theory of Cryptography Conference (TCC) 2005, LNCS 3378, 66-85, Springer, 2005
Sarah Scheffler, Eran Tromer, Mayank Varia,
Formalizing human ingenuity: a quantitative framework for copyright law’s substantial similarity,
preprint,
Hardware-Based Cryptanalysis,
Ph.D. dissertation, 2007
(Partial)
Just a little of that human touch,
Presented together with Daniel Genkin,
CRYPTO 2014 rump session, August 2014
Integrity in car-computing: a cryptographic vision for integrity in vehicle networks,
C: there's a SNARK for that,
Presenting joint work with Eli Ben-Sasson, Alessandro Chiesa, Daniel Genkin, Madars Virza,
USENIX Security 2013 rump session, August 2013
The dread, deed and dream of cyber-security,
Kavli Frontiers of Science Israeli-American Symposium, organized by the Israel Academy of Science and Humanities and U.S. National Academy of Sciences, June 2013
The hunting of the SNARK,
Presenting joint work with Nir Bitansky, Ran Canetti, Alessandro Chiesa,
CRYPTO 2011 rump session, August 2011
Architectural attacks and their mitigation by binary transformation,
ACM Symposium on Operating Systems Principles (SOSP) 2009 work-in-progress session, 2009
Architectural side channels in cloud computing, invited talk, Crypto in the Cloud workshop, MIT, August 2009
Protecting circuits from computationally-bounded leakage,
invited talk, Crypto in the Cloud workshop, MIT, August 2009
Cloud Computing and Virtualization panel,
MIT CSAIL Industry Affiliates Program, MIT, May 2009
Cache-based side channel attacks and their implications, invited talk at the Quo Vadis Cryptography workshop, Warsaw, May 2007
Invited talks at Microsoft Research Summer School, Indian Institute of Science, 2006
Cryptanalytic applications of the PlayStation 3: the case of DES,
SHARCS 2006 rump session, April 2006
Special-purpose hardware for factoring,
invited talk at the Quo Vadis Cryptography workshop, Warsaw, May 2005
FSE 2005 rump session, February 2005
Full AES key extraction in 65 milliseconds using cache attacks,
CRYPTO 2005 rump session, August 2005
Special-purpose hardware for factoring: the NFS sieving step,
invited talk at SHARCS 2005, February 2005
Acoustic cryptanalysis: on nosy people and noisy machines, Eurocrypt 2004 rump session, May 2004
Hardware-based implementations of factoring algorithms,
invited talk at ECC 2003, August 2003
Carl Ellison, Victor Miller, Eran Tromer, Rebecca Wright
On the design and cryptanalysis of a one-way hash,
Journal of Craptology volume 5, 2008
Presented at the CRYPTO 2007 rump session, August 2007