Eran Tromer mostly deals with Cryptography, Verifiable computing, Encryption, Theoretical computer science and Zero-knowledge proof. The various areas that Eran Tromer examines in his Cryptography study include Entropy, Acoustic cryptanalysis and Modular exponentiation. Eran Tromer has included themes like Discrete mathematics and Hash function in his Verifiable computing study.
His study in Encryption is interdisciplinary in nature, drawing from both CPU cache, Cache, Side channel attack and Cryptographic primitive. His study focuses on the intersection of Cache and fields such as Timing attack with connections in the field of Embedded system. His Theoretical computer science study incorporates themes from Homomorphic encryption, Secure multi-party computation, Computation and Distributed computing.
The scientist’s investigation covers issues in Cryptography, Theoretical computer science, Computation, Encryption and Zero-knowledge proof. His Cryptography research integrates issues from CPU cache, Cache, Protocol, Von Neumann architecture and Embedded system. The concepts of his Theoretical computer science study are interwoven with issues in Gas meter prover, Random oracle, Correctness, Construct and Hash function.
His Encryption research entails a greater understanding of Computer security. His Computer security study combines topics from a wide range of disciplines, such as Payment and Digital currency. The study incorporates disciplines such as Succinctness, Scalability and Verifiable computing in addition to Zero-knowledge proof.
His primary areas of investigation include Code, Computer security, Computation, Encryption and Computer vision. Eran Tromer interconnects Web content and CPU cache, Operating system, Scripting language, Cache in the investigation of issues within Code. His research in Computer security intersects with topics in Web service and Layer.
The concepts of his Computation study are interwoven with issues in Verifiable secret sharing, Homomorphic encryption, Cloud computing and Distributed computing. His study in the field of Advanced Encryption Standard also crosses realms of Context. His Computer vision study combines topics in areas such as Desk, Videoconferencing and Artificial intelligence.
Computer security, Middleware, Resource, Access control and Enforcement are his primary areas of study. Eran Tromer does research in Computer security, focusing on Encryption specifically. His Middleware research spans across into subjects like Layer, Web service and Situational ethics.
This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.
Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds
Thomas Ristenpart;Eran Tromer;Hovav Shacham;Stefan Savage.
computer and communications security (2009)
Zerocash: Decentralized Anonymous Payments from Bitcoin
Eli Ben Sasson;Alessandro Chiesa;Christina Garman;Matthew Green.
ieee symposium on security and privacy (2014)
Cache attacks and countermeasures: the case of AES
Dag Arne Osvik;Adi Shamir;Eran Tromer.
the cryptographers track at the rsa conference (2006)
On-the-fly multiparty computation on the cloud via multikey fully homomorphic encryption
Adriana López-Alt;Eran Tromer;Vinod Vaikuntanathan.
symposium on the theory of computing (2012)
SNARKs for C: Verifying Program Executions Succinctly and in Zero Knowledge.
Eli Ben-Sasson;Alessandro Chiesa;Daniel Genkin;Eran Tromer.
IACR Cryptology ePrint Archive (2013)
RSA Key Extraction via Low-Bandwidth Acoustic Cryptanalysis
Daniel Genkin;Adi Shamir;Eran Tromer.
international cryptology conference (2014)
Efficient Cache Attacks on AES, and Countermeasures
Eran Tromer;Dag Arne Osvik;Adi Shamir.
Journal of Cryptology (2010)
SNARKs for C : verifying program executions succinctly and in zero knowledge
Eli Ben-Sasson;Alessandro Chiesa;Daniel Genkin;Eran Tromer.
international cryptology conference (2013)
Succinct non-interactive zero knowledge for a von Neumann architecture
Eli Ben-Sasson;Alessandro Chiesa;Eran Tromer;Madars Virza.
usenix security symposium (2014)
Get your hands off my laptop: physical side-channel key-extraction attacks on PCs
Daniel Genkin;Daniel Genkin;Itamar Pipman;Eran Tromer.
Journal of Cryptographic Engineering (2015)
If you think any of the details on this page are incorrect, let us know.
We appreciate your kind effort to assist us to improve this page, it would be helpful providing us with as much detail as possible in the text box below:
University of Michigan–Ann Arbor
Weizmann Institute of Science
Technion – Israel Institute of Technology
Boston University
Boston University
Cornell University
Johns Hopkins University
University of Adelaide
École Polytechnique Fédérale de Lausanne
Uppsala University
Georgia Institute of Technology
American University of Sharjah
Bielefeld University
University College Cork
Central China Normal University
University of Canterbury
University of Kent
University of Colorado Denver
Institute for Systems Biology
University College London
University of Hong Kong
Henry Ford Health System
University of California, San Francisco
Johns Hopkins University Applied Physics Laboratory
Leiden University