D-Index & Metrics Best Publications

D-Index & Metrics D-index (Discipline H-index) only includes papers and citation values for an examined discipline in contrast to General H-index which accounts for publications across all disciplines.

Discipline name D-index D-index (Discipline H-index) only includes papers and citation values for an examined discipline in contrast to General H-index which accounts for publications across all disciplines. Citations Publications World Ranking National Ranking
Computer Science D-index 35 Citations 12,661 68 World Ranking 7359 National Ranking 133

Overview

What is he best known for?

The fields of study he is best known for:

  • Operating system
  • Computer network
  • The Internet

Eran Tromer mostly deals with Cryptography, Verifiable computing, Encryption, Theoretical computer science and Zero-knowledge proof. The various areas that Eran Tromer examines in his Cryptography study include Entropy, Acoustic cryptanalysis and Modular exponentiation. Eran Tromer has included themes like Discrete mathematics and Hash function in his Verifiable computing study.

His study in Encryption is interdisciplinary in nature, drawing from both CPU cache, Cache, Side channel attack and Cryptographic primitive. His study focuses on the intersection of Cache and fields such as Timing attack with connections in the field of Embedded system. His Theoretical computer science study incorporates themes from Homomorphic encryption, Secure multi-party computation, Computation and Distributed computing.

His most cited work include:

  • Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds (1778 citations)
  • Cache attacks and countermeasures: the case of AES (914 citations)
  • Zerocash: Decentralized Anonymous Payments from Bitcoin (753 citations)

What are the main themes of his work throughout his whole career to date?

The scientist’s investigation covers issues in Cryptography, Theoretical computer science, Computation, Encryption and Zero-knowledge proof. His Cryptography research integrates issues from CPU cache, Cache, Protocol, Von Neumann architecture and Embedded system. The concepts of his Theoretical computer science study are interwoven with issues in Gas meter prover, Random oracle, Correctness, Construct and Hash function.

His Encryption research entails a greater understanding of Computer security. His Computer security study combines topics from a wide range of disciplines, such as Payment and Digital currency. The study incorporates disciplines such as Succinctness, Scalability and Verifiable computing in addition to Zero-knowledge proof.

He most often published in these fields:

  • Cryptography (28.09%)
  • Theoretical computer science (23.60%)
  • Computation (19.10%)

What were the highlights of his more recent work (between 2016-2021)?

  • Code (8.99%)
  • Computer security (12.36%)
  • Computation (19.10%)

In recent papers he was focusing on the following fields of study:

His primary areas of investigation include Code, Computer security, Computation, Encryption and Computer vision. Eran Tromer interconnects Web content and CPU cache, Operating system, Scripting language, Cache in the investigation of issues within Code. His research in Computer security intersects with topics in Web service and Layer.

The concepts of his Computation study are interwoven with issues in Verifiable secret sharing, Homomorphic encryption, Cloud computing and Distributed computing. His study in the field of Advanced Encryption Standard also crosses realms of Context. His Computer vision study combines topics in areas such as Desk, Videoconferencing and Artificial intelligence.

Between 2016 and 2021, his most popular works were:

  • Beauty and the burst: remote identification of encrypted video streams (56 citations)
  • Acoustic Cryptanalysis (29 citations)
  • Situational Access Control in the Internet of Things (29 citations)

In his most recent research, the most cited papers focused on:

  • Operating system
  • Computer network
  • The Internet

Computer security, Middleware, Resource, Access control and Enforcement are his primary areas of study. Eran Tromer does research in Computer security, focusing on Encryption specifically. His Middleware research spans across into subjects like Layer, Web service and Situational ethics.

This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.

Best Publications

Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds

Thomas Ristenpart;Eran Tromer;Hovav Shacham;Stefan Savage.
computer and communications security (2009)

2777 Citations

Zerocash: Decentralized Anonymous Payments from Bitcoin

Eli Ben Sasson;Alessandro Chiesa;Christina Garman;Matthew Green.
ieee symposium on security and privacy (2014)

1708 Citations

Cache attacks and countermeasures: the case of AES

Dag Arne Osvik;Adi Shamir;Eran Tromer.
the cryptographers track at the rsa conference (2006)

1508 Citations

On-the-fly multiparty computation on the cloud via multikey fully homomorphic encryption

Adriana López-Alt;Eran Tromer;Vinod Vaikuntanathan.
symposium on the theory of computing (2012)

766 Citations

SNARKs for C: Verifying Program Executions Succinctly and in Zero Knowledge.

Eli Ben-Sasson;Alessandro Chiesa;Daniel Genkin;Eran Tromer.
IACR Cryptology ePrint Archive (2013)

599 Citations

RSA Key Extraction via Low-Bandwidth Acoustic Cryptanalysis

Daniel Genkin;Adi Shamir;Eran Tromer.
international cryptology conference (2014)

520 Citations

Efficient Cache Attacks on AES, and Countermeasures

Eran Tromer;Dag Arne Osvik;Adi Shamir.
Journal of Cryptology (2010)

508 Citations

SNARKs for C : verifying program executions succinctly and in zero knowledge

Eli Ben-Sasson;Alessandro Chiesa;Daniel Genkin;Eran Tromer.
international cryptology conference (2013)

503 Citations

Succinct non-interactive zero knowledge for a von Neumann architecture

Eli Ben-Sasson;Alessandro Chiesa;Eran Tromer;Madars Virza.
usenix security symposium (2014)

493 Citations

Get your hands off my laptop: physical side-channel key-extraction attacks on PCs

Daniel Genkin;Daniel Genkin;Itamar Pipman;Eran Tromer.
Journal of Cryptographic Engineering (2015)

400 Citations

If you think any of the details on this page are incorrect, let us know.

Contact us

Best Scientists Citing Eran Tromer

Berk Sunar

Berk Sunar

Worcester Polytechnic Institute

Publications: 65

Thomas Eisenbarth

Thomas Eisenbarth

University of Lübeck

Publications: 44

Yuval Yarom

Yuval Yarom

University of Adelaide

Publications: 43

Yuval Ishai

Yuval Ishai

Technion – Israel Institute of Technology

Publications: 38

Ruby B. Lee

Ruby B. Lee

Princeton University

Publications: 35

Daniel Wichs

Daniel Wichs

Northeastern University

Publications: 34

Yael Tauman Kalai

Yael Tauman Kalai

MIT

Publications: 34

Shai Halevi

Shai Halevi

Algorand Foundation

Publications: 30

Stefan Mangard

Stefan Mangard

Graz University of Technology

Publications: 30

Daniel Genkin

Daniel Genkin

University of Michigan–Ann Arbor

Publications: 29

Amit Sahai

Amit Sahai

University of California, Los Angeles

Publications: 27

Elaine Shi

Elaine Shi

Carnegie Mellon University

Publications: 27

Ahmad-Reza Sadeghi

Ahmad-Reza Sadeghi

Technical University of Darmstadt

Publications: 26

Dan Boneh

Dan Boneh

Stanford University

Publications: 25

Kristin E. Lauter

Kristin E. Lauter

Facebook (United States)

Publications: 23

Michael Walfish

Michael Walfish

New York University

Publications: 23

Trending Scientists

Erik Hagersten

Erik Hagersten

Uppsala University

Jianxin Jiao

Jianxin Jiao

Georgia Institute of Technology

Mohamed Ben-Daya

Mohamed Ben-Daya

American University of Sharjah

Thomas Koop

Thomas Koop

Bielefeld University

Edwin R. Morris

Edwin R. Morris

University College Cork

Jia‐Rong Chen

Jia‐Rong Chen

Central China Normal University

Robert R. Jackson

Robert R. Jackson

University of Canterbury

Colin Robinson

Colin Robinson

University of Kent

Rafael Moreno-Sánchez

Rafael Moreno-Sánchez

University of Colorado Denver

Robert L. Moritz

Robert L. Moritz

Institute for Systems Biology

Simon A. Parfitt

Simon A. Parfitt

University College London

Tatia M.C. Lee

Tatia M.C. Lee

University of Hong Kong

Edward L. Peterson

Edward L. Peterson

Henry Ford Health System

Carl Grunfeld

Carl Grunfeld

University of California, San Francisco

Harold A. Weaver

Harold A. Weaver

Johns Hopkins University Applied Physics Laboratory

P. van der Werf

P. van der Werf

Leiden University

Something went wrong. Please try again later.