default search action
Eran Tromer
Person information
- affiliation: Columbia University, New York, NY, USA
- affiliation (former): Weizmann Institute of Science, Israel
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c55]Zeyu Liu, Eran Tromer, Yunhao Wang:
Group Oblivious Message Retrieval. SP 2024: 4367-4385 - [c54]Zeyu Liu, Eran Tromer, Yunhao Wang:
PerfOMR: Oblivious Message Retrieval with Reduced Communication and Computation. USENIX Security Symposium 2024 - [c53]Daniel Luick, John C. Kolesar, Timos Antonopoulos, William R. Harris, James Parker, Ruzica Piskac, Eran Tromer, Xiao Wang, Ning Luo:
ZKSMT: A VM for Proving SMT Theorems in Zero Knowledge. USENIX Security Symposium 2024 - [i40]Zeyu Liu, Eran Tromer, Yunhao Wang:
PerfOMR: Oblivious Message Retrieval with Reduced Communication and Computation. IACR Cryptol. ePrint Arch. 2024: 204 (2024) - [i39]Zeyu Liu, Katerina Sotiraki, Eran Tromer, Yunhao Wang:
DoS-resistant Oblivious Message Retrieval from Snake-eye Resistant PKE. IACR Cryptol. ePrint Arch. 2024: 510 (2024) - 2023
- [c52]Ben Nassi, Ofek Vayner, Etay Iluz, Dudi Nassi, Jan Jancar, Daniel Genkin, Eran Tromer, Boris Zadov, Yuval Elovici:
Optical Cryptanalysis: Recovering Cryptographic Keys from Power LED Light Fluctuations. CCS 2023: 268-280 - [c51]Jonathan Prokos, Neil Fendley, Matthew Green, Roei Schuster, Eran Tromer, Tushar M. Jois, Yinzhi Cao:
Squint Hard Enough: Attacking Perceptual Hashing with Adversarial Machine Learning. USENIX Security Symposium 2023: 211-228 - [c50]Santiago Cuéllar, Bill Harris, James Parker, Stuart Pernsteiner, Eran Tromer:
Cheesecloth: Zero-Knowledge Proofs of Real World Vulnerabilities. USENIX Security Symposium 2023: 6525-6540 - [i38]Santiago Cuéllar, Bill Harris, James Parker, Stuart Pernsteiner, Eran Tromer:
Cheesecloth: Zero-Knowledge Proofs of Real-World Vulnerabilities. CoRR abs/2301.01321 (2023) - [i37]Zeyu Liu, Eran Tromer, Yunhao Wang:
Group Oblivious Message Retrieval. IACR Cryptol. ePrint Arch. 2023: 534 (2023) - [i36]Ben Nassi, Ofek Vayner, Etay Iluz, Dudi Nassi, Or Hai Cohen, Jan Jancar, Daniel Genkin, Eran Tromer, Boris Zadov, Yuval Elovici:
Optical Cryptanalysis: Recovering Cryptographic Keys from Power LED Light Fluctuations. IACR Cryptol. ePrint Arch. 2023: 1068 (2023) - [i35]Daniel Luick, John C. Kolesar, Timos Antonopoulos, William R. Harris, James Parker, Ruzica Piskac, Eran Tromer, Xiao Wang, Ning Luo:
ZKSMT: A VM for Proving SMT Theorems in Zero Knowledge. IACR Cryptol. ePrint Arch. 2023: 1762 (2023) - 2022
- [j11]Tamir Mendel, Roei Schuster, Eran Tromer, Eran Toch:
Toward Proactive Support for Older Adults: Predicting the Right Moment for Providing Mobile Safety Help. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 6(1): 25:1-25:25 (2022) - [c49]Ning Luo, Timos Antonopoulos, William R. Harris, Ruzica Piskac, Eran Tromer, Xiao Wang:
Proving UNSAT in Zero Knowledge. CCS 2022: 2203-2217 - [c48]Zeyu Liu, Eran Tromer:
Oblivious Message Retrieval. CRYPTO (1) 2022: 753-783 - [c47]Sarah Scheffler, Eran Tromer, Mayank Varia:
Formalizing Human Ingenuity: A Quantitative Framework for Copyright Law's Substantial Similarity. CSLAW 2022: 37-49 - [c46]Ghada Almashaqbeh, Ran Canetti, Yaniv Erlich, Jonathan Gershoni, Tal Malkin, Itsik Pe'er, Anna Roitburd-Berman, Eran Tromer:
Unclonable Polymers and Their Cryptographic Applications. EUROCRYPT (1) 2022: 759-789 - [c45]Psi Vesely, Kobi Gurkan, Michael Straka, Ariel Gabizon, Philipp Jovanovic, Georgios Konstantopoulos, Asa Oines, Marek Olszewski, Eran Tromer:
Plumo: An Ultralight Blockchain Client. Financial Cryptography 2022: 597-614 - [c44]Daniel Genkin, Noam Nissan, Roei Schuster, Eran Tromer:
Lend Me Your Ear: Passive Remote Physical Side Channels on PCs. USENIX Security Symposium 2022: 4437-4454 - [i34]Sarah Scheffler, Eran Tromer, Mayank Varia:
Formalizing Human Ingenuity: A Quantitative Framework for Copyright Law's Substantial Similarity. CoRR abs/2206.01230 (2022) - [i33]Ning Luo, Timos Antonopoulos, William R. Harris, Ruzica Piskac, Eran Tromer, Xiao Wang:
Proving UNSAT in Zero Knowledge. IACR Cryptol. ePrint Arch. 2022: 206 (2022) - [i32]Ghada Almashaqbeh, Ran Canetti, Yaniv Erlich, Jonathan Gershoni, Tal Malkin, Itsik Pe'er, Anna Roitburd-Berman, Eran Tromer:
Unclonable Polymers and Their Cryptographic Applications. IACR Cryptol. ePrint Arch. 2022: 658 (2022) - 2021
- [j10]Ghada Almashaqbeh, Fabrice Benhamouda, Seungwook Han, Daniel Jaroslawicz, Tal Malkin, Alex Nicita, Tal Rabin, Abhishek Shah, Eran Tromer:
Gage MPC: Bypassing Residual Function Leakage for Non-Interactive MPC. Proc. Priv. Enhancing Technol. 2021(4): 528-548 (2021) - [c43]Roei Schuster, Congzheng Song, Eran Tromer, Vitaly Shmatikov:
You Autocomplete Me: Poisoning Vulnerabilities in Neural Code Completion. USENIX Security Symposium 2021: 1559-1575 - [i31]Ghada Almashaqbeh, Fabrice Benhamouda, Seungwook Han, Daniel Jaroslawicz, Tal Malkin, Alex Nicita, Tal Rabin, Abhishek Shah, Eran Tromer:
Gage MPC: Bypassing Residual Function Leakage for Non-Interactive MPC. IACR Cryptol. ePrint Arch. 2021: 256 (2021) - [i30]Zeyu Liu, Eran Tromer:
Oblivious Messsage Retrieval. IACR Cryptol. ePrint Arch. 2021: 1256 (2021) - [i29]Psi Vesely, Kobi Gurkan, Michael Straka, Ariel Gabizon, Philipp Jovanovic, Georgios Konstantopoulos, Asa Oines, Marek Olszewski, Eran Tromer:
Plumo: An Ultralight Blockchain Client. IACR Cryptol. ePrint Arch. 2021: 1361 (2021) - [i28]Jonathan Prokos, Tushar M. Jois, Neil Fendley, Roei Schuster, Matthew Green, Eran Tromer, Yinzhi Cao:
Squint Hard Enough: Evaluating Perceptual Hashing with Machine Learning. IACR Cryptol. ePrint Arch. 2021: 1531 (2021) - 2020
- [i27]Roei Schuster, Congzheng Song, Eran Tromer, Vitaly Shmatikov:
You Autocomplete Me: Poisoning Vulnerabilities in Neural Code Completion. CoRR abs/2007.02220 (2020)
2010 – 2019
- 2019
- [c42]Daniel Genkin, Mihir Pattani, Roei Schuster, Eran Tromer:
Synesthesia: Detecting Screen Content via Remote Acoustic Side Channels. IEEE Symposium on Security and Privacy 2019: 853-869 - 2018
- [c41]Daniel Genkin, Lev Pachmanov, Eran Tromer, Yuval Yarom:
Drive-By Key-Extraction Cache Attacks from Portable Code. ACNS 2018: 83-102 - [c40]Roei Schuster, Vitaly Shmatikov, Eran Tromer:
Situational Access Control in the Internet of Things. CCS 2018: 1056-1073 - [i26]Daniel Genkin, Mihir Pattani, Roei Schuster, Eran Tromer:
Synesthesia: Detecting Screen Content via Remote Acoustic Side Channels. CoRR abs/1809.02629 (2018) - [i25]Daniel Genkin, Lev Pachmanov, Eran Tromer, Yuval Yarom:
Drive-by Key-Extraction Cache Attacks from Portable Code. IACR Cryptol. ePrint Arch. 2018: 119 (2018) - 2017
- [j9]Eli Ben-Sasson, Alessandro Chiesa, Eran Tromer, Madars Virza:
Scalable Zero Knowledge Via Cycles of Elliptic Curves. Algorithmica 79(4): 1102-1160 (2017) - [j8]Daniel Genkin, Adi Shamir, Eran Tromer:
Acoustic Cryptanalysis. J. Cryptol. 30(2): 392-443 (2017) - [j7]Nir Bitansky, Ran Canetti, Alessandro Chiesa, Shafi Goldwasser, Huijia Lin, Aviad Rubinstein, Eran Tromer:
The Hunting of the SNARK. J. Cryptol. 30(4): 989-1066 (2017) - [j6]Adriana López-Alt, Eran Tromer, Vinod Vaikuntanathan:
Multikey Fully Homomorphic Encryption and Applications. SIAM J. Comput. 46(6): 1827-1892 (2017) - [c39]Eli Ben-Sasson, Iddo Bentov, Alessandro Chiesa, Ariel Gabizon, Daniel Genkin, Matan Hamilis, Evgenya Pergament, Michael Riabzev, Mark Silberstein, Eran Tromer, Madars Virza:
Computational Integrity with a Public Random String from Quasi-Linear PCPs. EUROCRYPT (3) 2017: 551-579 - [c38]Roei Schuster, Vitaly Shmatikov, Eran Tromer:
Beauty and the Burst: Remote Identification of Encrypted Video Streams. USENIX Security Symposium 2017: 1357-1374 - 2016
- [j5]Daniel Genkin, Lev Pachmanov, Itamar Pipman, Adi Shamir, Eran Tromer:
Physical key extraction attacks on PCs. Commun. ACM 59(6): 70-79 (2016) - [c37]Eran Tromer, Roei Schuster:
DroidDisintegrator: Intra-Application Information Flow Control in Android Apps. AsiaCCS 2016: 401-412 - [c36]Daniel Genkin, Lev Pachmanov, Itamar Pipman, Eran Tromer, Yuval Yarom:
ECDSA Key Extraction from Mobile Devices via Nonintrusive Physical Side Channels. CCS 2016: 1626-1638 - [c35]Daniel Genkin, Lev Pachmanov, Itamar Pipman, Eran Tromer:
ECDH Key-Extraction via Low-Bandwidth Electromagnetic Attacks on PCs. CT-RSA 2016: 219-235 - [c34]Eli Ben-Sasson, Matan Hamilis, Mark Silberstein, Eran Tromer:
Fast Multiplication in Binary Fields on GPUs via Register Cache. ICS 2016: 35:1-35:12 - [c33]Assa Naveh, Eran Tromer:
PhotoProof: Cryptographic Image Authentication for Any Set of Permissible Transformations. IEEE Symposium on Security and Privacy 2016: 255-271 - [i24]Daniel Genkin, Lev Pachmanov, Itamar Pipman, Eran Tromer:
ECDH Key-Extraction via Low-Bandwidth Electromagnetic Attacks on PCs. IACR Cryptol. ePrint Arch. 2016: 129 (2016) - [i23]Daniel Genkin, Lev Pachmanov, Itamar Pipman, Eran Tromer, Yuval Yarom:
ECDSA Key Extraction from Mobile Devices via Nonintrusive Physical Side Channels. IACR Cryptol. ePrint Arch. 2016: 230 (2016) - [i22]Eli Ben-Sasson, Iddo Bentov, Alessandro Chiesa, Ariel Gabizon, Daniel Genkin, Matan Hamilis, Evgenya Pergament, Michael Riabzev, Mark Silberstein, Eran Tromer, Madars Virza:
Computational integrity with a public random string from quasi-linear PCPs. IACR Cryptol. ePrint Arch. 2016: 646 (2016) - 2015
- [j4]Daniel Genkin, Itamar Pipman, Eran Tromer:
Get your hands off my laptop: physical side-channel key-extraction attacks on PCs - Extended version. J. Cryptogr. Eng. 5(2): 95-112 (2015) - [j3]Sharon Goldberg, David Xiao, Eran Tromer, Boaz Barak, Jennifer Rexford:
Path-Quality Monitoring in the Presence of Adversaries: The Secure Sketch Protocols. IEEE/ACM Trans. Netw. 23(6): 1729-1741 (2015) - [c32]Daniel Genkin, Lev Pachmanov, Itamar Pipman, Eran Tromer:
Stealing Keys from PCs Using a Radio: Cheap Electromagnetic Attacks on Windowed Exponentiation. CHES 2015: 207-228 - [c31]Alessandro Chiesa, Eran Tromer, Madars Virza:
Cluster Computing in Zero Knowledge. EUROCRYPT (2) 2015: 371-403 - [c30]Almog Benin, Sivan Toledo, Eran Tromer:
Secure Association for the Internet of Things. SIoT 2015: 25-34 - [c29]Eli Ben-Sasson, Alessandro Chiesa, Matthew Green, Eran Tromer, Madars Virza:
Secure Sampling of Public Parameters for Succinct Zero Knowledge Proofs. IEEE Symposium on Security and Privacy 2015: 287-304 - [i21]Daniel Genkin, Yuval Ishai, Manoj Prabhakaran, Amit Sahai, Eran Tromer:
Circuits Resilient to Additive Attacks with Applications to Secure Computation. IACR Cryptol. ePrint Arch. 2015: 154 (2015) - [i20]Daniel Genkin, Lev Pachmanov, Itamar Pipman, Eran Tromer:
Stealing Keys from PCs using a Radio: Cheap Electromagnetic Attacks on Windowed Exponentiation. IACR Cryptol. ePrint Arch. 2015: 170 (2015) - [i19]Alessandro Chiesa, Eran Tromer, Madars Virza:
Cluster Computing in Zero Knowledge. IACR Cryptol. ePrint Arch. 2015: 377 (2015) - [i18]Almog Benin, Sivan Toledo, Eran Tromer:
Secure Association for the Internet of Things. IACR Cryptol. ePrint Arch. 2015: 940 (2015) - 2014
- [j2]Sebastian Faust, Tal Rabin, Leonid Reyzin, Eran Tromer, Vinod Vaikuntanathan:
Protecting Circuits from Computationally Bounded and Noisy Leakage. SIAM J. Comput. 43(5): 1564-1614 (2014) - [c28]Daniel Genkin, Itamar Pipman, Eran Tromer:
Get Your Hands Off My Laptop: Physical Side-Channel Key-Extraction Attacks on PCs. CHES 2014: 242-260 - [c27]Eli Ben-Sasson, Alessandro Chiesa, Eran Tromer, Madars Virza:
Scalable Zero Knowledge via Cycles of Elliptic Curves. CRYPTO (2) 2014: 276-294 - [c26]Daniel Genkin, Adi Shamir, Eran Tromer:
RSA Key Extraction via Low-Bandwidth Acoustic Cryptanalysis. CRYPTO (1) 2014: 444-461 - [c25]Eli Ben-Sasson, Alessandro Chiesa, Christina Garman, Matthew Green, Ian Miers, Eran Tromer, Madars Virza:
Zerocash: Decentralized Anonymous Payments from Bitcoin. IEEE Symposium on Security and Privacy 2014: 459-474 - [c24]Daniel Genkin, Yuval Ishai, Manoj Prabhakaran, Amit Sahai, Eran Tromer:
Circuits resilient to additive attacks with applications to secure computation. STOC 2014: 495-504 - [c23]Eli Ben-Sasson, Alessandro Chiesa, Eran Tromer, Madars Virza:
Succinct Non-Interactive Zero Knowledge for a von Neumann Architecture. USENIX Security Symposium 2014: 781-796 - [i17]Eli Ben-Sasson, Alessandro Chiesa, Christina Garman, Matthew Green, Ian Miers, Eran Tromer, Madars Virza:
Zerocash: Decentralized Anonymous Payments from Bitcoin. IACR Cryptol. ePrint Arch. 2014: 349 (2014) - [i16]Nir Bitansky, Ran Canetti, Alessandro Chiesa, Shafi Goldwasser, Huijia Lin, Aviad Rubinstein, Eran Tromer:
The Hunting of the SNARK. IACR Cryptol. ePrint Arch. 2014: 580 (2014) - [i15]Eli Ben-Sasson, Alessandro Chiesa, Eran Tromer, Madars Virza:
Scalable Zero Knowledge via Cycles of Elliptic Curves. IACR Cryptol. ePrint Arch. 2014: 595 (2014) - [i14]Daniel Genkin, Itamar Pipman, Eran Tromer:
Get Your Hands Off My Laptop: Physical Side-Channel Key-Extraction Attacks on PCs. IACR Cryptol. ePrint Arch. 2014: 626 (2014) - 2013
- [c22]Eli Ben-Sasson, Alessandro Chiesa, Daniel Genkin, Eran Tromer, Madars Virza:
SNARKs for C: Verifying Program Executions Succinctly and in Zero Knowledge. CRYPTO (2) 2013: 90-108 - [c21]Eli Ben-Sasson, Alessandro Chiesa, Daniel Genkin, Eran Tromer:
Fast reductions from RAMs to delegatable succinct constraint satisfaction problems: extended abstract. ITCS 2013: 401-414 - [c20]Ory Samorodnitzky, Eran Tromer, Avishai Wool:
Analyzing Unique-Bid Auction Sites for Fun and Profit. NDSS 2013 - [c19]Nir Bitansky, Ran Canetti, Alessandro Chiesa, Eran Tromer:
Recursive composition and bootstrapping for SNARKS and proof-carrying data. STOC 2013: 111-120 - [c18]Eli Ben-Sasson, Alessandro Chiesa, Daniel Genkin, Eran Tromer:
On the concrete efficiency of probabilistically-checkable proofs. STOC 2013: 585-594 - [i13]Adriana López-Alt, Eran Tromer, Vinod Vaikuntanathan:
On-the-Fly Multiparty Computation on the Cloud via Multikey Fully Homomorphic Encryption. IACR Cryptol. ePrint Arch. 2013: 94 (2013) - [i12]Eli Ben-Sasson, Alessandro Chiesa, Daniel Genkin, Eran Tromer, Madars Virza:
SNARKs for C: Verifying Program Executions Succinctly and in Zero Knowledge. IACR Cryptol. ePrint Arch. 2013: 507 (2013) - [i11]Stephen Chong, Eran Tromer, Jeffrey A. Vaughan:
Enforcing Language Semantics Using Proof-Carrying Data. IACR Cryptol. ePrint Arch. 2013: 513 (2013) - [i10]Daniel Genkin, Adi Shamir, Eran Tromer:
RSA Key Extraction via Low-Bandwidth Acoustic Cryptanalysis. IACR Cryptol. ePrint Arch. 2013: 857 (2013) - [i9]Eli Ben-Sasson, Alessandro Chiesa, Eran Tromer, Madars Virza:
Succinct Non-Interactive Arguments for a von Neumann Architecture. IACR Cryptol. ePrint Arch. 2013: 879 (2013) - 2012
- [c17]Gilad Asharov, Abhishek Jain, Adriana López-Alt, Eran Tromer, Vinod Vaikuntanathan, Daniel Wichs:
Multiparty Computation with Low Communication, Computation and Interaction via Threshold FHE. EUROCRYPT 2012: 483-501 - [c16]Nir Bitansky, Ran Canetti, Alessandro Chiesa, Eran Tromer:
From extractable collision resistance to succinct non-interactive arguments of knowledge, and back again. ITCS 2012: 326-349 - [c15]Adriana López-Alt, Eran Tromer, Vinod Vaikuntanathan:
On-the-fly multiparty computation on the cloud via multikey fully homomorphic encryption. STOC 2012: 1219-1234 - [c14]Shai Shalev-Shwartz, Ohad Shamir, Eran Tromer:
Using More Data to Speed-up Training Time. AISTATS 2012: 1019-1027 - [i8]Eli Ben-Sasson, Alessandro Chiesa, Daniel Genkin, Eran Tromer:
On the Concrete-Efficiency Threshold of Probabilistically-Checkable Proofs. Electron. Colloquium Comput. Complex. TR12 (2012) - [i7]Eli Ben-Sasson, Alessandro Chiesa, Daniel Genkin, Eran Tromer:
Fast Reductions from RAMs to Delegatable Succinct Constraint Satisfaction Problems. IACR Cryptol. ePrint Arch. 2012: 71 (2012) - [i6]Nir Bitansky, Ran Canetti, Alessandro Chiesa, Eran Tromer:
Recursive Composition and Bootstrapping for SNARKs and Proof-Carrying Data. IACR Cryptol. ePrint Arch. 2012: 95 (2012) - 2011
- [r2]Adi Shamir, Eran Tromer:
TWIRL. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 1338-1339 - [i5]Shai Shalev-Shwartz, Ohad Shamir, Eran Tromer:
Using More Data to Speed-up Training Time. CoRR abs/1106.1216 (2011) - [i4]Nir Bitansky, Ran Canetti, Alessandro Chiesa, Eran Tromer:
From Extractable Collision Resistance to Succinct Non-Interactive Arguments of Knowledge, and Back Again. IACR Cryptol. ePrint Arch. 2011: 443 (2011) - [i3]Adriana López-Alt, Eran Tromer, Vinod Vaikuntanathan:
Cloud-Assisted Multiparty Computation from Fully Homomorphic Encryption. IACR Cryptol. ePrint Arch. 2011: 663 (2011) - 2010
- [j1]Eran Tromer, Dag Arne Osvik, Adi Shamir:
Efficient Cache Attacks on AES, and Countermeasures. J. Cryptol. 23(1): 37-71 (2010) - [c13]Sebastian Faust, Tal Rabin, Leonid Reyzin, Eran Tromer, Vinod Vaikuntanathan:
Protecting Circuits from Leakage: the Computationally-Bounded and Noisy Cases. EUROCRYPT 2010: 135-156 - [c12]Alessandro Chiesa, Eran Tromer:
Proof-Carrying Data and Hearsay Arguments from Signature Cards. ICS 2010: 310-331
2000 – 2009
- 2009
- [c11]Thomas Ristenpart, Eran Tromer, Hovav Shacham, Stefan Savage:
Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds. CCS 2009: 199-212 - [c10]Maxwell N. Krohn, Eran Tromer:
Noninterference for a Practical DIFC-Based Operating System. SP 2009: 61-76 - [i2]Sebastian Faust, Leonid Reyzin, Eran Tromer:
Protecting Circuits from Computationally-Bounded Leakage. IACR Cryptol. ePrint Arch. 2009: 379 (2009) - 2008
- [c9]Sharon Goldberg, David Xiao, Eran Tromer, Boaz Barak, Jennifer Rexford:
Path-quality monitoring in the presence of adversaries. SIGMETRICS 2008: 193-204 - 2006
- [c8]Dag Arne Osvik, Adi Shamir, Eran Tromer:
Cache Attacks and Countermeasures: The Case of AES. CT-RSA 2006: 1-20 - 2005
- [c7]Willi Geiselmann, Adi Shamir, Rainer Steinwandt, Eran Tromer:
Scalable Hardware for Sparse Systems of Linear Equations, with Applications to Integer Factorization. CHES 2005: 131-146 - [c6]Willi Geiselmann, Hubert Köpfer, Rainer Steinwandt, Eran Tromer:
Improved Routing-Based Linear Algebra for the Number Field Sieve. ITCC (1) 2005: 636-641 - [c5]Moni Naor, Asaf Nussboim, Eran Tromer:
Efficiently Constructible Huge Graphs That Preserve First Order Properties of Random Graphs. TCC 2005: 66-85 - [r1]Adi Shamir, Eran Tromer:
TWIRL. Encyclopedia of Cryptography and Security 2005 - [i1]Dag Arne Osvik, Adi Shamir, Eran Tromer:
Cache attacks and Countermeasures: the Case of AES. IACR Cryptol. ePrint Arch. 2005: 271 (2005) - 2003
- [c4]Arjen K. Lenstra, Eran Tromer, Adi Shamir, Wil Kortsmit, Bruce Dodson, James P. Hughes, Paul C. Leyland:
Factoring Estimates for a 1024-Bit RSA Modulus. ASIACRYPT 2003: 55-74 - [c3]Boaz Barak, Ronen Shaltiel, Eran Tromer:
True Random Number Generators Secure in a Changing Environment. CHES 2003: 166-180 - [c2]Adi Shamir, Eran Tromer:
Factoring Large Number with the TWIRL Device. CRYPTO 2003: 1-26 - 2002
- [c1]Arjen K. Lenstra, Adi Shamir, Jim Tomlinson, Eran Tromer:
Analysis of Bernstein's Factorization Circuit. ASIACRYPT 2002: 1-26
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-01 20:44 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint