Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds T Ristenpart, E Tromer, H Shacham, S Savage ACM conference on Computer and Communications Security (CCS), 199-212, 2009 | 2976 | 2009 |
Zerocash: Decentralized anonymous payments from Bitcoin EB Sasson, A Chiesa, C Garman, M Green, I Miers, E Tromer, M Virza IEEE Symposium on Security and Privacy (SP) 2014, 459-474, 2014 | 2517 | 2014 |
Cache attacks and countermeasures: the case of AES DA Osvik, A Shamir, E Tromer CT-RSA 2006, 1-20, 2006 | 1919 | 2006 |
On-the-fly multiparty computation on the cloud via multikey fully homomorphic encryption A López-Alt, E Tromer, V Vaikuntanathan ACM symposium on Theory of Computing (STOC) 2012, 1219-1234, 2012 | 1135 | 2012 |
Succinct non-interactive zero knowledge for a von Neumann architecture E Ben-Sasson, A Chiesa, E Tromer, M Virza 23rd USENIX Security Symposium (USENIX Security 14), 781-796, 2014 | 850 | 2014 |
SNARKs for C: Verifying program executions succinctly and in zero knowledge E Ben-Sasson, A Chiesa, D Genkin, E Tromer, M Virza CRYPTO 2013, 90-108, 2013 | 821 | 2013 |
Efficient cache attacks on AES, and countermeasures E Tromer, DA Osvik, A Shamir Journal of Cryptology 23, 37-71, 2010 | 641 | 2010 |
RSA Key Extraction via Low-Bandwidth Acoustic Cryptanalysis. D Genkin, A Shamir, E Tromer CRYPTO 2014 1, 444-461, 2014 | 633 | 2014 |
From extractable collision resistance to succinct non-interactive arguments of knowledge, and back again N Bitansky, R Canetti, A Chiesa, E Tromer Innovations in Theoretical Computer Science Conference (ITCS) 2012, 326-349, 2012 | 608 | 2012 |
Multiparty computation with low communication, computation and interaction via threshold FHE G Asharov, A Jain, A López-Alt, E Tromer, V Vaikuntanathan, D Wichs Eurocrypt 2012, 483-501, 2012 | 540 | 2012 |
Recursive composition and bootstrapping for SNARKs and proof-carrying data N Bitansky, R Canetti, A Chiesa, E Tromer ACM symposium on Theory of computing (STOC) 2013, 111-120, 2013 | 370 | 2013 |
Scalable zero knowledge via cycles of elliptic curves E Ben-Sasson, A Chiesa, E Tromer, M Virza CRYPTO 2014 2, 276-294, 2014 | 344 | 2014 |
Get your hands off my laptop: Physical side-channel key-extraction attacks on PCs (extended version) D Genkin, I Pipman, E Tromer Journal of Cryptographic Engineering 5 (2), 95-112, 2015 | 238 | 2015 |
ECDSA key extraction from mobile devices via nonintrusive physical side channels D Genkin, L Pachmanov, I Pipman, E Tromer, Y Yarom Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016 | 228 | 2016 |
Stealing Keys from PCs using a Radio: Cheap Electromagnetic Attacks on Windowed Exponentiation D Genkin, L Pachmanov, I Pipman, E Tromer Workshop on Cryptographic Hardware and Embedded Systems (CHES) 2015, 207-228, 2015 | 217 | 2015 |
Beauty and the burst: Remote identification of encrypted video streams R Schuster, V Shmatikov, E Tromer 26th USENIX Security Symposium (USENIX Security 17), 1357-1374, 2017 | 210 | 2017 |
Secure sampling of public parameters for succinct zero knowledge proofs E Ben-Sasson, A Chiesa, M Green, E Tromer, M Virza IEEE Symposium on Security and Privacy (SP) 2015, 287-304, 2015 | 208 | 2015 |
Protecting circuits from leakage: the computationally-bounded and noisy cases S Faust, T Rabin, L Reyzin, E Tromer, V Vaikuntanathan Advances in Cryptology–EUROCRYPT 2010: 29th Annual International Conference …, 2010 | 188 | 2010 |
The hunting of the SNARK N Bitansky, R Canetti, A Chiesa, S Goldwasser, H Lin, A Rubinstein, ... Journal of Cryptology 30 (4), 989-1066, 2017 | 183 | 2017 |
Factoring large numbers with the TWIRL device A Shamir, E Tromer CRYPTO 2003, 1-26, 2003 | 181 | 2003 |