Daniel Genkin Coauthor index pubzone.org

Facets and more with CompleteSearch

Listing of the DBLP Bibliography Server - FAQ
Other views (modern): by type - by year
Other mirrors: Trier II - Dagstuhl


Ask others: ACM DL/Guide - CiteSeerx - CSB - MetaPress - Google - Bing - Yahoo
DBLP keys2017
j6Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLYuval Yarom, Daniel Genkin, Nadia Heninger: CacheBleed: a timing attack on OpenSSL constant-time RSA. J. Cryptographic Engineering 7(2): 99-112 (2017)
j5Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLDaniel Genkin, Adi Shamir, Eran Tromer: Acoustic Cryptanalysis. J. Cryptology 30(2): 392-443 (2017)
c14Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLEli Ben-Sasson, Iddo Bentov, Alessandro Chiesa, Ariel Gabizon, Daniel Genkin, Matan Hamilis, Evgenya Pergament, Michael Riabzev, Mark Silberstein, Eran Tromer, Madars Virza: Computational Integrity with a Public Random String from Quasi-Linear PCPs. EUROCRYPT (3) 2017: 551-579
2016
j4Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLDaniel Genkin, Lev Pachmanov, Itamar Pipman, Adi Shamir, Eran Tromer: Physical key extraction attacks on PCs. Commun. ACM 59(6): 70-79 (2016)
c13Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLDaniel Genkin, Lev Pachmanov, Itamar Pipman, Eran Tromer, Yuval Yarom: ECDSA Key Extraction from Mobile Devices via Nonintrusive Physical Side Channels. ACM Conference on Computer and Communications Security 2016: 1626-1638
c12Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLYuval Yarom, Daniel Genkin, Nadia Heninger: CacheBleed: A Timing Attack on OpenSSL Constant Time RSA. CHES 2016: 346-367
c11Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLDaniel Genkin, Lev Pachmanov, Itamar Pipman, Eran Tromer: ECDH Key-Extraction via Low-Bandwidth Electromagnetic Attacks on PCs. CT-RSA 2016: 219-235
c10Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLDaniel Genkin, Yuval Ishai, Mor Weiss: Binary AMD Circuits from Secure Multiparty Computation. TCC (B1) 2016: 336-366
i12Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLDaniel Genkin, Lev Pachmanov, Itamar Pipman, Eran Tromer: ECDH Key-Extraction via Low-Bandwidth Electromagnetic Attacks on PCs. IACR Cryptology ePrint Archive 2016: 129 (2016)
i11Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLYuval Yarom, Daniel Genkin, Nadia Heninger: CacheBleed: A Timing Attack on OpenSSL Constant Time RSA. IACR Cryptology ePrint Archive 2016: 224 (2016)
i10Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLDaniel Genkin, Lev Pachmanov, Itamar Pipman, Eran Tromer, Yuval Yarom: ECDSA Key Extraction from Mobile Devices via Nonintrusive Physical Side Channels. IACR Cryptology ePrint Archive 2016: 230 (2016)
i9Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLEli Ben-Sasson, Iddo Bentov, Alessandro Chiesa, Ariel Gabizon, Daniel Genkin, Matan Hamilis, Evgenya Pergament, Michael Riabzev, Mark Silberstein, Eran Tromer, Madars Virza: Computational integrity with a public random string from quasi-linear PCPs. IACR Cryptology ePrint Archive 2016: 646 (2016)
i8Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLDaniel Genkin, Yuval Ishai, Mor Weiss: Binary AMD Circuits from Secure Multiparty Computation. IACR Cryptology ePrint Archive 2016: 809 (2016)
2015
j3Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLDaniel Genkin, Itamar Pipman, Eran Tromer: Get your hands off my laptop: physical side-channel key-extraction attacks on PCs - Extended version. J. Cryptographic Engineering 5(2): 95-112 (2015)
c9Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLDaniel Genkin, Lev Pachmanov, Itamar Pipman, Eran Tromer: Stealing Keys from PCs Using a Radio: Cheap Electromagnetic Attacks on Windowed Exponentiation. CHES 2015: 207-228
c8Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLDaniel Genkin, Yuval Ishai, Antigoni Polychroniadou: Efficient Multi-party Computation: From Passive to Active Security via Secure SIMD Circuits. CRYPTO (2) 2015: 721-741
i7Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLDaniel Genkin, Yuval Ishai, Manoj Prabhakaran, Amit Sahai, Eran Tromer: Circuits Resilient to Additive Attacks with Applications to Secure Computation. IACR Cryptology ePrint Archive 2015: 154 (2015)
i6Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLDaniel Genkin, Lev Pachmanov, Itamar Pipman, Eran Tromer: Stealing Keys from PCs using a Radio: Cheap Electromagnetic Attacks on Windowed Exponentiation. IACR Cryptology ePrint Archive 2015: 170 (2015)
2014
j2Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLDaniel Genkin, Michael Kaminski, Liat Peterfreund: A note on the emptiness problem for alternating finite-memory automata. Theor. Comput. Sci. 526: 97-107 (2014)
c7Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLDaniel Genkin, Itamar Pipman, Eran Tromer: Get Your Hands Off My Laptop: Physical Side-Channel Key-Extraction Attacks on PCs. CHES 2014: 242-260
c6Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLDaniel Genkin, Adi Shamir, Eran Tromer: RSA Key Extraction via Low-Bandwidth Acoustic Cryptanalysis. CRYPTO (1) 2014: 444-461
c5Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLDaniel Genkin, Yuval Ishai, Manoj Prabhakaran, Amit Sahai, Eran Tromer: Circuits resilient to additive attacks with applications to secure computation. STOC 2014: 495-504
i5Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLDaniel Genkin, Itamar Pipman, Eran Tromer: Get Your Hands Off My Laptop: Physical Side-Channel Key-Extraction Attacks on PCs. IACR Cryptology ePrint Archive 2014: 626 (2014)
2013
c4Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLEli Ben-Sasson, Alessandro Chiesa, Daniel Genkin, Eran Tromer, Madars Virza: SNARKs for C: Verifying Program Executions Succinctly and in Zero Knowledge. CRYPTO (2) 2013: 90-108
c3Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLEli Ben-Sasson, Alessandro Chiesa, Daniel Genkin, Eran Tromer: Fast reductions from RAMs to delegatable succinct constraint satisfaction problems: extended abstract. ITCS 2013: 401-414
c2Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLEli Ben-Sasson, Alessandro Chiesa, Daniel Genkin, Eran Tromer: On the concrete efficiency of probabilistically-checkable proofs. STOC 2013: 585-594
i4Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLEli Ben-Sasson, Alessandro Chiesa, Daniel Genkin, Eran Tromer, Madars Virza: SNARKs for C: Verifying Program Executions Succinctly and in Zero Knowledge. IACR Cryptology ePrint Archive 2013: 507 (2013)
i3Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLDaniel Genkin, Adi Shamir, Eran Tromer: RSA Key Extraction via Low-Bandwidth Acoustic Cryptanalysis. IACR Cryptology ePrint Archive 2013: 857 (2013)
2012
i2Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLEli Ben-Sasson, Alessandro Chiesa, Daniel Genkin, Eran Tromer: On the Concrete-Efficiency Threshold of Probabilistically-Checkable Proofs. Electronic Colloquium on Computational Complexity (ECCC) 19: 45 (2012)
i1Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLEli Ben-Sasson, Alessandro Chiesa, Daniel Genkin, Eran Tromer: Fast Reductions from RAMs to Delegatable Succinct Constraint Satisfaction Problems. IACR Cryptology ePrint Archive 2012: 71 (2012)
2010
j1Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLTamar Aizikowitz, Nissim Francez, Daniel Genkin, Michael Kaminski: Extending Free Pregroups with Lower Bounds. Studia Logica 95(3): 417-441 (2010)
c1Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLDaniel Genkin, Nissim Francez, Michael Kaminski: Mildly Context-Sensitive Languages via Buffer Augmented Pregroup Grammars. Essays in Memory of Amir Pnueli 2010: 144-166

Coauthor Index

1Tamar Aizikowitz[j1]
2Eli Ben-Sasson[c14] [i9] [c4] [c3] [c2] [i4] [i2] [i1]
3Iddo Bentov[c14] [i9]
4Alessandro Chiesa[c14] [i9] [c4] [c3] [c2] [i4] [i2] [i1]
5Nissim Francez[j1] [c1]
6Ariel Gabizon[c14] [i9]
7Matan Hamilis[c14] [i9]
8Nadia Heninger[j6] [c12] [i11]
9Yuval Ishai[c10] [i8] [c8] [i7] [c5]
10Michael Kaminski[j2] [j1] [c1]
11Lev Pachmanov[j4] [c13] [c11] [i12] [i10] [c9] [i6]
12Evgenya Pergament[c14] [i9]
13Liat Peterfreund[j2]
14Itamar Pipman[j4] [c13] [c11] [i12] [i10] [j3] [c9] [i6] [c7] [i5]
15Antigoni Polychroniadou[c8]
16Manoj Prabhakaran[i7] [c5]
17Michael Riabzev[c14] [i9]
18Amit Sahai[i7] [c5]
19Adi Shamir[j5] [j4] [c6] [i3]
20Mark Silberstein[c14] [i9]
21Eran Tromer[j5] [c14] [j4] [c13] [c11] [i12] [i10] [i9] [j3] [c9] [i7] [i6] [c7] [c6] [c5] [i5] [c4] [c3] [c2] [i4] [i3] [i2] [i1]
22Madars Virza[c14] [i9] [c4] [i4]
23Mor Weiss[c10] [i8]
24Yuval Yarom[j6] [c13] [c12] [i11] [i10]

 

Last update 2017-05-24 02:30 CEST by the DBLP TeamThis material is Open Data Data released under the ODC-BY 1.0 license — See also our legal information page