Publications


Papers

(Within each topic, in reverse chronological order)

Side-channel attacks
extracting secret keys by eavesdropping on program execution or communication

  • Ben Nassi, Ofek Vayner, Etay Iluz, Dudi Nassi, Or Hai Cohen, Jan Jancar, Daniel Genkin, Eran Tromer, Boris Zadov, Yuval Elovici,

    Optical cryptanalysis: recovering cryptographic keys from power LED light fluctuations

    proc. ACM Conference on Computer and Communications Security (CCS) 2023, 268-280 ACM, 2023

  • Daniel Genkin, Noam Nissan, Roei Schuster, Eran Tromer,

    Lend me your ear: passive remote physical side channels on PCs

    proc. USENIX Security 2022

  • Daniel Genkin, Mihir Pattani, Roei Schuster, Eran Tromer,

    Synesthesia: Detecting Screen Content via Remote Acoustic Side Channels

    proc. IEEE Symposium on Security & Privacy (S&P) 2019, 853-869, IEEE, 2019

  • Daniel Genkin, Lev Pachmanov, Eran Tromer, Yuval Yarom,

    Drive-by Key-Extraction Cache Attacks from Portable Code

    proc. Applied Cryptography and Network Security (ACNS) 2018), LNCS 10892, 83-102, Springer, 2018

  • Roei Schuster, Vitaly Shmatikov, Eran Tromer,

    Beauty and the Burst: remote identification of encrypted video streams,

    proc. USENIX Security 2017, 1357-1374, USENIX, 2017

  • Daniel Genkin, Lev Pachmanov, Itamar Pipman, Adi Shamir, Eran Tromer, Yuval Yarom,

    Physical key extraction attacks on PCs,

    Communications of the ACM, vol. 59 no. 6, 70-79, 2016

  • Daniel Genkin, Lev Pachmanov, Itamar Pipman, Eran Tromer, Yuval Yarom,

    ECDSA key extraction from mobile devices via nonintrusive physical side channels,

    proc. ACM Conference on Computer and Communications Security (CCS) 2016, 1626-1638, 2016

  • Daniel Genkin, Lev Pachmanov, Itamar Pipman, Eran Tromer,

    ECDH key-extraction via low-bandwidth electromagnetic attacks on PCs,

    proc. RSA Conference Cryptographers' Track (CT-RSA) 2016, LNCS 9610, 219-235, Springer, 2016

  • Daniel Genkin, Lev Pachmanov, Itamar Pipman, Eran Tromer,

    Stealing keys from PCs using a radio: cheap electromagnetic attacks on windowed exponentiation,

    proc. Workshop on Cryptographic Hardware and Embedded Systems (CHES) 2015, LNCS 9293, 207--228, Springer, 2015

  • Daniel Genkin, Itamar Pipman, Eran Tromer,

    Get your hands off my laptop: physical side-channel key-extraction attacks on PCs (extended version),

    Journal of Cryptographic Engineering, vol. 5 no. 2, 95--112, 2015

  • Daniel Genkin, Itamar Pipman, Eran Tromer,

    Get your hands off my laptop: physical side-channel key-extraction attacks on PCs,

    proc. Workshop on Cryptographic Hardware and Embedded Systems (CHES) 2014, LNCS 8731, 242-260, Springer, 2014

    ◆ Selected by the PC as one of the conference's 3 top papers

  • Daniel Genkin, Adi Shamir, Eran Tromer,

    RSA key extraction via low-bandwidth acoustic cryptanalysis,

    proc. CRYPTO 2014, part I, LNCS 8616, 444-461, Springer, 2014

    ◆ Black Hat 2014 Pwnie Award for Most Innovative Research

    ◆ Chosen by the PC as one of the conference's 3 top papers

  • Eran Tromer, Dag Arne Osvik, Adi Shamir,

    Efficient cache attacks on AES, and countermeasures,

    Journal of Cryptology, vol. 23 no. 1, 37-71, Springer, 2010

  • Thomas Ristenpart, Eran Tromer, Hovav Shacham, Stefan Savage,

    Hey, you, get off of my cloud! Exploring information leakage in third-party compute clouds,

    proc. ACM Conference on Computer and Communications Security (CCS) 2009, 199-212, ACM, 2009

    ◆ awarded ACM CCS Test-of-Time Award

  • Dag Arne Osvik, Adi Shamir, Eran Tromer,

    Cache attacks and countermeasures: the case of AES,

    proc. RSA Conference Cryptographers' Track (CT-RSA) 2006, LNCS 3860, 1-20, Springer, 2006

Blockchains, cryptocurrencies and auctions

  • Zeyu Liu, Katerina Sotiraki, Eran Tromer, Yunhao Wang,

    DoS-resistant oblivious message retrieval from snake-eye resistant PKE,

    preprint

  • Zeyu Liu, Eran Tromer, Yunhao Wang,

    PerfOMR: oblivious message retrieval with reduced communication and computation,

    proc. USENIX Security 2024, to appear

  • Zeyu Liu, Eran Tromer,

    Group oblivious message retrieval,

    proc. IEEE Symposium on Security & Privacy (S&P) 2024, to appear

  • Shlomit Azgad-Tromer, Joey Garcia Eran Tromer,

    The case for on chain privacy and compliance

    Stanford Journal of Blockchain Law & Policy, Vol. 6, No. 2, 2023

  • Zeyu Liu, Eran Tromer,

    Oblivious message retrieval,

    proc. CRYPTO 2022, part 1, LNCS 13507, 753-783, Springer, 2022

  • Psi Vesely, Michael Straka, Philipp Jovanovic, Ariel Gabizon, Kobi Gurkan, Georgios Konstantopoulos, Asa Oines, Marek Olszewski, Eran Tromer

    Plumo: An Ultralight Blockchain Client,

    proc. Financial Cryptography and Data Security (FC) 2022, to appear

    Early version at ZKProof Standardization Workshop 2020

  • Ghada Almashaqbeh, Fabrice Benhamouda, Seungwook Han, Daniel Jaroslawicz, Tal Malkin, Alex Nicita, Tal Rabin, Abhishek Shah, Eran Tromer,

    Gage MPC: bypassing residual function leakage for non-interactive MPC,

    Proceedings on Privacy Enhancing Technologies Symposium (PoPETS) 2021, vol.~4, 528--548, 2021

  • Eli Ben-Sasson, Alessandro Chiesa, Christina Garman, Matthew Green, Ian Miers, Eran Tromer, Madars Virza,

    Zerocash: decentralized anonymous payments from Bitcoin,

    proc. IEEE Symposium on Security & Privacy (S&P) 2014, 459-474, IEEE, 2014

  • Ory Samorodnitzky, Eran Tromer, Avishai Wool,

    Analyzing unique-bid auction sites for fun and profit,

    proc. Network & Distributed System Security Symposium (NDSS) 2013, 2013

Cryptographically verified computation
zero-knowledge proofs, and proving correct execution of programs running on untrusted platforms

  • Daniel Luick, John Kolesar, Timos Antonopoulos, William R. Harris, James Parker, Ruzica Piskac, Eran Tromer, Xiao Wang, Ning Luo

    ZKSMT: a VM for proving SMT theorems in zero knowledge

  • Santiago Cuéllar, Bill Harris, James Parker, Stuart Pernsteiner, Eran Tromer,

    Cheesecloth: zero-knowledge proofs of real-world vulnerabilities

    proc. USENIX Security 2023, 6525-6540

  • Ning Luo, Timos Antonopoulos, William Harris, Ruzica Piskac, Eran Tromer, Xiao Wang.

    Proving UNSAT in zero knowledge

    proc. ACM Conference on Computer and Communications Security (CCS) 2022

    ◆ ACM CCS 2022 Distinguished Paper Award

  • Plumo: An Ultralight Blockchain Client

  • Eli Ben-Sasson, Iddo Ben-Tov, Alessandro Chiesa, Ariel Gabizon, Daniel Genkin, Matan Hamilis, Evgenya Pergament, Michael Riabzev, Mark Silberstein, Eran Tromer, Madars Virza,

    Computational integrity with a public random string from quasi-linear PCPs

    proc. Eurocrypt 2017, LNCS 10212, 551-579, 2017

  • Eli Ben-Sasson, Alessandro Chiesa, Eran Tromer, Madars Virza,

    Scalable zero knowledge via cycles of elliptic curves (extended version),

    Algorithmica, vol. 79, no. 4, 1102–1160, Springer, 2017

  • Assa Naveh, Eran Tromer,

    PhotoProof: cryptographic image authentication for any set of permissible transformations,

    proc. IEEE Symposium on Security & Privacy (S&P) 2016, 255-271, IEEE, 2016

  • Nir Bitansky, Ran Canetti, Alessandro Chiesa, Shafi Goldwasser, Huijia Lin, Aviad Rubinstein, Eran Tromer,

    The hunting of the SNARK,

    Journal of Cryptology, vol. 30, no. 4, 989-1066, Springer, 2017

  • Eli Ben-Sasson, Alessandro Chiesa, Matthew Green, Eran Tromer, Madars Virza,

    Secure sampling of public parameters for succinct zero knowledge proofs,

    proc. IEEE Symposium on Security & Privacy (S&P) 2015, 287-304, IEEE, 2015

  • Alessandro Chiesa, Eran Tromer, Madars Virza,

    Cluster computing in zero knowledge,

    proc. Eurocrypt 2015, vol. 2, LNCS 9057, 371-403, Springer, 2015

  • Eli Ben-Sasson, Alessandro Chiesa, Eran Tromer, Madars Virza,

    Scalable zero knowledge via cycles of elliptic curves,

    proc. CRYPTO 2014, part II, LNCS 8617, 276-294, Springer, 2014

  • Eli Ben-Sasson, Alessandro Chiesa, Eran Tromer, Madars Virza,

    Succinct non-interactive zero knowledge for a von Neumann architecture,

    proc. USENIX Security 2014, 781-796, USENIX, 2014

  • Stephen Chong, Eran Tromer, Jeffrey A. Vaughan,

    Enforcing language semantics using proof-carrying data,

    preprint, 2013

  • Eli Ben-Sasson, Alessandro Chiesa, Daniel Genkin, Eran Tromer, Madars Virza,

    SNARKs for C: verifying program executions succinctly and in zero knowledge,

    proc. CRYPTO 2013, vol. 2, LNCS 8043, 90-108, Springer, 2013

  • Eli Ben-Sasson, Alessandro Chiesa, Daniel Genkin, Eran Tromer,

    On the concrete efficiency of probabilistically-checkable proofs,

    proc. Symposium on Theory of Computing (STOC) 2013, 585-594, ACM, 2013

    • [ECCC] (title: On the concrete-efficiency threshold of probabilistically-checkable proofs)
  • Nir Bitansky, Ran Canetti, Alessandro Chiesa, Eran Tromer,

    Recursive composition and bootstrapping for SNARKs and proof-carrying data,

    proc. Symposium on Theory of Computing (STOC) 2013, 111-120, ACM, 2013

  • Eli Ben-Sasson, Alessandro Chiesa, Daniel Genkin, Eran Tromer,

    Fast reductions from RAMs to delegatable succinct constraint satisfaction problems,

    proc. Innovations in Theoretical Computer Science (ITCS) 2013, 401-414, ACM, 2013

  • Alessandro Chiesa, Eran Tromer,

    Proof-carrying data: secure computation on untrusted platforms,

    The Next Wave, vol. 19 no. 2, National Security Agency, 2012

  • Nir Bitansky, Ran Canetti, Alessandro Chiesa, Eran Tromer,

    From extractable collision resistance to succinct non-interactive arguments of knowledge, and back again,

    proc. Innovations in Computer Science (ITCS) 2012, 326-349, ACM, 2012

  • Alessandro Chiesa, Eran Tromer,

    Proof-carrying data and hearsay arguments from signature cards,

    proc. Innovations in Theoretical Computer Science (ITCS) 2010, 310-331, Tsinghua University Press, 2010

Machine learning

  • Jonathan Prokos, Neil Fendley, Matthew Green, Roei Schuster, Eran Tromer, Tushar Jois, Yinzhi Cao,

    Squint hard enough: attacking perceptual hashing with adversarial machine learning,

    proc. USENIX Security 2023, to appear

  • Roei Schuster, Congzheng Song, Eran Tromer, Vitaly Shmatikov,

    You autocomplete me: poisoning vulnerabilities in neural code completion,

    proc. USENIX Security 2021, 1559--1575, 2021

    ◆ USENIX Security Distinguished Paper Award

  • Shai Shalev-Shwartz, Ohad Shamir, Eran Tromer,

    Using more data to speed-up training time,

    proc. International Conference on Artificial Intelligence and Statistics (AISTATS) 2012, Journal of Machine Learning Research, vol. 22, 1019-1027, Microtome Publishing, 2012

Cryptographic hardware and code-breaking machines

  • Ghada Almashaqbeh, Ran Canetti, Yaniv Erlich, Jonathan Gershoni, Tal Malkin, Itsik Pe'er, Anna Roitburd-Berman, Eran Tromer,

    Unclonable polymers and their cryptographic applications,

    proc. Eurocrypt 2022, 229–242, LNCS 13275, Springer, 2022

  • Eli Ben Sasson, Matan Hamilis, Mark Silberstein, Eran Tromer,

    Fast multiplication in binary fields on GPUs via register cache,

    International Conference on Supercomputing (ICS) 2016, ACM, 2016

  • Willi Geiselmann, Adi Shamir, Rainer Steinwandt, Eran Tromer,

    Fault-tolerance in hardware for sparse systems of linear equations, with applications to integer factorization,

    Chapter 8 in N. Nedjah, L. de Macedo Mourelle (Eds.), New Trends in Cryptographic Systems, Nova Science Publishers, 2006

  • Willi Geiselmann, Adi Shamir, Rainer Steinwandt, Eran Tromer,

    Scalable Hardware for Sparse Systems of Linear Equations, with Applications to Integer Factorization,

    proc. Workshop on Cryptographic Hardware and Embedded Systems (CHES) 2005, LNCS 3659, 131-146, Springer, 2005

  • Willi Geiselmann, Adi Shamir, Rainer Steinwandt, Eran Tromer,

    A systolic design for supporting Wiedemann's algorithm,

    invited paper, proc. Workshop on Special Purpose Hardware for Attacking Cryptographic Systems (SHARCS), 13-17, 2005

    • See revised CHES 2005 version above.
  • Adi Shamir, Eran Tromer,

    Special-purpose hardware for factoring: the NFS sieving step,

    proc. Workshop on Special Purpose Hardware for Attacking Cryptographic Systems (SHARCS), 1-12, 2005

  • Willi Geiselmann, Hubert Köpfer, Rainer Steinwandt, Eran Tromer,

    Improved routing-based linear algebra for the number field sieve,

    proc. International Conference on Information Technology: Coding and Computing (ITCC'05), Volume 1, 636-641, IEEE, 2005

  • Arjen K. Lenstra, Eran Tromer, Adi Shamir, Wil Kortsmit, Bruce Dodson, James Hughes, Paul Leyland,

    Factoring estimates for a 1024-bit RSA modulus, proc. Asiacrypt 2003, LNCS 2894, 331-346, Springer, 2003

  • Adi Shamir, Eran Tromer,

    On the cost of factoring RSA-1024,

    RSA CryptoBytes, vol. 6 no. 2, 10-19, 2003

  • Adi Shamir, Eran Tromer,

    Factoring large numbers with the TWIRL device,

    proc. CRYPTO 2003, LNCS 2729, 1-26, Springer, 2003

  • Arjen K. Lenstra, Adi Shamir, Jim Tomlinson, Eran Tromer,

    Analysis of Bernstein's factorization circuit,

    proc. Asiacrypt 2002, LNCS 2501, 1-26, Springer, 2002

Operating systems and communication security

  • Roei Schuster, Vitaly Shmatikov, Eran Tromer,

    Situational Access Control in the Internet of Things,

    proc. ACM Conference on Computer and Communications Security (CCS) 2018, 1056-1073, ACM, 2018

  • Roei Schuster, Eran Tromer,

    DroidDisintegrator: intra-application information flow control in Android apps,

    proc. ACM Symposium on Information, Computer and Communications Security (ASIACCS) 2016, 401-412, ACM, 2016

  • Almog Benin, Sivan Toledo, Eran Tromer,

    Secure association for the Internet of Things,

    proc. International Workshop on Secure Internet of Things (SIoT) 2015, 25-34, IEEE, 2015

  • Sharon Goldberg, David Xiao, Eran Tromer, Boaz Barak, Jennifer Rexford,

    Path-quality monitoring in the presence of adversaries: the secure sketch protocol,

    IEEE/ACM Transactions on Networking, vol. 23 no. 6, 1729--1741, 2015

  • Maxwell Krohn, Eran Tromer,

    Non-interference for a practical DIFC-based operating system,

    proc. IEEE Symposium on Security and Privacy (S&P) 2009, 61-76, IEEE, 2009

  • Sharon Goldberg, David Xiao, Eran Tromer, Boaz Barak, Jennifer Rexford,

    Path-quality monitoring in the presence of adversaries,

    proc. SIGMETRICS 2008, 193-204, ACM, 2008

Leakage resilience, tamper resilience and homomorphic encryption
protecting computation from leakage and corruption

  • Adriana López-Alt, Eran Tromer, Vinod Vaikuntanathan,

    Multikey fully homomorphic encryption and MPC on the cloud,

    SIAM Journal on Computing (SICOMP), vol.46 no.6, 1827-1892, 2007

  • Sebastian Faust, Tal Rabin, Leonid Reyzin, Eran Tromer, Vinod Vaikuntanathan,

    Protecting circuits from computationally bounded and noisy leakage,

    SIAM Journal on Computing (SICOMP), vol. 43 no. 5 pp. 1564-1614, 2014

  • Daniel Genkin, Yuval Ishai, Manoj M. Prabhakaran, Amit Sahai, Eran Tromer,

    Circuits resilient to additive attacks with applications to secure computation,

    proc. Symposium on Theory of Computing (STOC) 2014, 495-504, ACM, 2014

  • Adriana López-Alt, Eran Tromer, Vinod Vaikuntanathan,

    On-the-fly multiparty computation on the cloud via multikey fully homomorphic encryption,

    proc. Symposium on Theory of Computing (STOC) 2012, 1219-1234, ACM, 2012

  • Gilad Asharov, Abhishek Jain, Adriana López-Alt, Eran Tromer, Vinod Vaikuntanathan, Daniel Wichs,

    Multiparty computation with low communication, computation and interaction via threshold FHE,

    proc. Eurocrypt 2012, LNCS 7237, 483-501, 2012

  • Sebastian Faust, Tal Rabin, Leonid Reyzin, Eran Tromer, Vinod Vaikuntanathan,

    Protecting circuits from leakage: the computationally-bounded and noisy cases,

    proc. Eurocrypt 2010, LNCS 6110, 135-156, Springer, 2010

  • Boaz Barak, Ronen Shaltiel, Eran Tromer,

    True random number generators secure in a changing environment,

    proc. Workshop on Cryptographic Hardware and Embedded Systems (CHES) 2003, LNCS 2779, 166-180, Springer, 2003

Hash functions

  • Squint hard enough: attacking perceptual hashing with adversarial machine learning

    (see above)

  • Ronald L. Rivest, Benjamin Agre, Daniel V. Bailey, Christopher Crutchfield, Yevgeniy Dodis, Kermin Elliott Fleming, Asif Khan, Jayant Krishnamurthy, Yuncheng Lin, Leo Reyzin, Emily Shen, Jim Sukha, Drew Sutherland, Eran Tromer, Yiqun Lisa Yin,

    The MD6 hash function — a proposal to NIST for SHA-3,

    submission to the National Institute of Standards and Technology hash function competition, 2008

  • Ran Canetti, Ron Rivest, Eran Tromer,

    Comments on NIST draft requirements and criteria for hash algorithm,

    letter to the National Institute of Standards and Technology, April 2007

Theoretical computer science

  • Moni Naor, Asaf Nussboim, Eran Tromer,

    Efficiently constructible huge graphs that preserve first order properties of random graphs,

    proc. Theory of Cryptography Conference (TCC) 2005, LNCS 3378, 66-85, Springer, 2005

Other

  • Sarah Scheffler, Eran Tromer, Mayank Varia,

    Formalizing human ingenuity: a quantitative framework for copyright law’s substantial similarity,

    preprint,

  • Eran Tromer,

    Hardware-Based Cryptanalysis,

    Ph.D. dissertation, 2007

Presentations

(Partial)

Humor

  • Carl Ellison, Victor Miller, Eran Tromer, Rebecca Wright

    On the design and cryptanalysis of a one-way hash,

    Journal of Craptology volume 5, 2008

    [pdf]

    Presented at the CRYPTO 2007 rump session, August 2007