BibTeX records: Daniel Genkin

download as .bib file

@article{DBLP:journals/corr/abs-2402-00641,
  author       = {Gilles Barthe and
                  Marcel B{\"{o}}hme and
                  Sunjay Cauligi and
                  Chitchanok Chuengsatiansup and
                  Daniel Genkin and
                  Marco Guarnieri and
                  David Mateos Romero and
                  Peter Schwabe and
                  David Wu and
                  Yuval Yarom},
  title        = {Testing side-channel security of cryptographic implementations against
                  future microarchitectures},
  journal      = {CoRR},
  volume       = {abs/2402.00641},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2402.00641},
  doi          = {10.48550/ARXIV.2402.00641},
  eprinttype    = {arXiv},
  eprint       = {2402.00641},
  timestamp    = {Fri, 09 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2402-00641.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChengCGMMYZ24,
  author       = {Shing Hing William Cheng and
                  Chitchanok Chuengsatiansup and
                  Daniel Genkin and
                  Dallas McNeil and
                  Toby Murray and
                  Yuval Yarom and
                  Zhiyuan Zhang},
  title        = {Evict+Spec+Time: Exploiting Out-of-Order Execution to Improve Cache-Timing
                  Attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {149},
  year         = {2024},
  url          = {https://eprint.iacr.org/2024/149},
  timestamp    = {Fri, 16 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/ChengCGMMYZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/ChidaHIKGLN23,
  author       = {Koji Chida and
                  Koki Hamada and
                  Dai Ikarashi and
                  Ryo Kikuchi and
                  Daniel Genkin and
                  Yehuda Lindell and
                  Ariel Nof},
  title        = {Fast Large-Scale Honest-Majority {MPC} for Malicious Adversaries},
  journal      = {J. Cryptol.},
  volume       = {36},
  number       = {3},
  pages        = {15},
  year         = {2023},
  url          = {https://doi.org/10.1007/s00145-023-09453-7},
  doi          = {10.1007/S00145-023-09453-7},
  timestamp    = {Sat, 20 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/ChidaHIKGLN23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/pacmpl/KuepperEGCSTWCC23,
  author       = {Joel Kuepper and
                  Andres Erbsen and
                  Jason Gross and
                  Owen Conoly and
                  Chuyue Sun and
                  Samuel Tian and
                  David Wu and
                  Adam Chlipala and
                  Chitchanok Chuengsatiansup and
                  Daniel Genkin and
                  Markus Wagner and
                  Yuval Yarom},
  title        = {CryptOpt: Verified Compilation with Randomized Program Search for
                  Cryptographic Primitives},
  journal      = {Proc. {ACM} Program. Lang.},
  volume       = {7},
  number       = {{PLDI}},
  pages        = {1268--1292},
  year         = {2023},
  url          = {https://doi.org/10.1145/3591272},
  doi          = {10.1145/3591272},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/pacmpl/KuepperEGCSTWCC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiaccs/GenkinKLTUY23,
  author       = {Daniel Genkin and
                  William Kosasih and
                  Fangfei Liu and
                  Anna Trikalinou and
                  Thomas Unterluggauer and
                  Yuval Yarom},
  editor       = {Joseph K. Liu and
                  Yang Xiang and
                  Surya Nepal and
                  Gene Tsudik},
  title        = {CacheFX: {A} Framework for Evaluating Cache Security},
  booktitle    = {Proceedings of the 2023 {ACM} Asia Conference on Computer and Communications
                  Security, {ASIA} {CCS} 2023, Melbourne, VIC, Australia, July 10-14,
                  2023},
  pages        = {163--176},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3579856.3595794},
  doi          = {10.1145/3579856.3595794},
  timestamp    = {Fri, 21 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiaccs/GenkinKLTUY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/NassiVINJGTZE23,
  author       = {Ben Nassi and
                  Ofek Vayner and
                  Etay Iluz and
                  Dudi Nassi and
                  Jan Jancar and
                  Daniel Genkin and
                  Eran Tromer and
                  Boris Zadov and
                  Yuval Elovici},
  editor       = {Weizhi Meng and
                  Christian Damsgaard Jensen and
                  Cas Cremers and
                  Engin Kirda},
  title        = {Optical Cryptanalysis: Recovering Cryptographic Keys from Power {LED}
                  Light Fluctuations},
  booktitle    = {Proceedings of the 2023 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2023, Copenhagen, Denmark, November
                  26-30, 2023},
  pages        = {268--280},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3576915.3616620},
  doi          = {10.1145/3576915.3616620},
  timestamp    = {Tue, 28 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/NassiVINJGTZE23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/0007SGY23,
  author       = {Jason Kim and
                  Stephan van Schaik and
                  Daniel Genkin and
                  Yuval Yarom},
  editor       = {Weizhi Meng and
                  Christian Damsgaard Jensen and
                  Cas Cremers and
                  Engin Kirda},
  title        = {iLeakage: Browser-based Timerless Speculative Execution Attacks on
                  Apple Devices},
  booktitle    = {Proceedings of the 2023 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2023, Copenhagen, Denmark, November
                  26-30, 2023},
  pages        = {2038--2052},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3576915.3616611},
  doi          = {10.1145/3576915.3616611},
  timestamp    = {Tue, 28 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/0007SGY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icse/KuepperWEGCSTCC23,
  author       = {Joel Kuepper and
                  David Wu and
                  Andres Erbsen and
                  Jason Gross and
                  Owen Conoly and
                  Chuyue Sun and
                  Samuel Tian and
                  Adam Chlipala and
                  Chitchanok Chuengsatiansup and
                  Daniel Genkin and
                  Markus Wagner and
                  Yuval Yarom},
  title        = {CryptOpt: Automatic Optimization of Straightline Code},
  booktitle    = {45th {IEEE/ACM} International Conference on Software Engineering:
                  {ICSE} 2023 Companion Proceedings, Melbourne, Australia, May 14-20,
                  2023},
  pages        = {141--145},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/ICSE-Companion58688.2023.00042},
  doi          = {10.1109/ICSE-COMPANION58688.2023.00042},
  timestamp    = {Tue, 18 Jul 2023 09:25:31 +0200},
  biburl       = {https://dblp.org/rec/conf/icse/KuepperWEGCSTCC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwpc/KimGL23,
  author       = {Jason Kim and
                  Daniel Genkin and
                  Kevin Leach},
  title        = {Revisiting Lightweight Compiler Provenance Recovery on {ARM} Binaries},
  booktitle    = {31st {IEEE/ACM} International Conference on Program Comprehension,
                  {ICPC} 2023, Melbourne, Australia, May 15-16, 2023},
  pages        = {292--303},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/ICPC58990.2023.00044},
  doi          = {10.1109/ICPC58990.2023.00044},
  timestamp    = {Thu, 20 Jul 2023 21:02:45 +0200},
  biburl       = {https://dblp.org/rec/conf/iwpc/KimGL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/ShivakumarBBCCGOSSY23,
  author       = {Basavesh Ammanaghatta Shivakumar and
                  Jack Barnes and
                  Gilles Barthe and
                  Sunjay Cauligi and
                  Chitchanok Chuengsatiansup and
                  Daniel Genkin and
                  Sioli O'Connell and
                  Peter Schwabe and
                  Rui Qi Sim and
                  Yuval Yarom},
  title        = {Spectre Declassified: Reading from the Right Place at the Wrong Time},
  booktitle    = {44th {IEEE} Symposium on Security and Privacy, {SP} 2023, San Francisco,
                  CA, USA, May 21-25, 2023},
  pages        = {1753--1770},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/SP46215.2023.10179355},
  doi          = {10.1109/SP46215.2023.10179355},
  timestamp    = {Thu, 27 Jul 2023 08:17:10 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/ShivakumarBBCCGOSSY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/0002GWY23,
  author       = {Robert Dumitru and
                  Daniel Genkin and
                  Andrew Wabnitz and
                  Yuval Yarom},
  editor       = {Joseph A. Calandrino and
                  Carmela Troncoso},
  title        = {The Impostor Among {US(B):} Off-Path Injection Attacks on {USB} Communications},
  booktitle    = {32nd {USENIX} Security Symposium, {USENIX} Security 2023, Anaheim,
                  CA, USA, August 9-11, 2023},
  pages        = {5863--5880},
  publisher    = {{USENIX} Association},
  year         = {2023},
  url          = {https://www.usenix.org/conference/usenixsecurity23/presentation/dumitru},
  timestamp    = {Wed, 18 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/0002GWY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/Taneja0XSGY23,
  author       = {Hritvik Taneja and
                  Jason Kim and
                  Jie Jeff Xu and
                  Stephan van Schaik and
                  Daniel Genkin and
                  Yuval Yarom},
  editor       = {Joseph A. Calandrino and
                  Carmela Troncoso},
  title        = {Hot Pixels: Frequency, Power, and Temperature Attacks on GPUs and
                  Arm SoCs},
  booktitle    = {32nd {USENIX} Security Symposium, {USENIX} Security 2023, Anaheim,
                  CA, USA, August 9-11, 2023},
  pages        = {6275--6292},
  publisher    = {{USENIX} Association},
  year         = {2023},
  url          = {https://www.usenix.org/conference/usenixsecurity23/presentation/taneja},
  timestamp    = {Wed, 18 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/Taneja0XSGY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/KwongW0BGRSWY23,
  author       = {Andrew Kwong and
                  Walter Wang and
                  Jason Kim and
                  Jonathan Berger and
                  Daniel Genkin and
                  Eyal Ronen and
                  Hovav Shacham and
                  Riad S. Wahby and
                  Yuval Yarom},
  editor       = {Joseph A. Calandrino and
                  Carmela Troncoso},
  title        = {Checking Passwords on Leaky Computers: {A} Side Channel Analysis of
                  Chrome's Password Leak Detect Protocol},
  booktitle    = {32nd {USENIX} Security Symposium, {USENIX} Security 2023, Anaheim,
                  CA, USA, August 9-11, 2023},
  pages        = {7107--7124},
  publisher    = {{USENIX} Association},
  year         = {2023},
  url          = {https://www.usenix.org/conference/usenixsecurity23/presentation/kwong},
  timestamp    = {Wed, 18 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/KwongW0BGRSWY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/ZhangTOCGY23,
  author       = {Zhiyuan Zhang and
                  Mingtian Tao and
                  Sioli O'Connell and
                  Chitchanok Chuengsatiansup and
                  Daniel Genkin and
                  Yuval Yarom},
  editor       = {Joseph A. Calandrino and
                  Carmela Troncoso},
  title        = {BunnyHop: Exploiting the Instruction Prefetcher},
  booktitle    = {32nd {USENIX} Security Symposium, {USENIX} Security 2023, Anaheim,
                  CA, USA, August 9-11, 2023},
  pages        = {7321--7337},
  publisher    = {{USENIX} Association},
  year         = {2023},
  url          = {https://www.usenix.org/conference/usenixsecurity23/presentation/zhang-zhiyuan-bunnyhop},
  timestamp    = {Wed, 18 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/ZhangTOCGY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2305-03934,
  author       = {Jason Kim and
                  Daniel Genkin and
                  Kevin Leach},
  title        = {Revisiting Lightweight Compiler Provenance Recovery on {ARM} Binaries},
  journal      = {CoRR},
  volume       = {abs/2305.03934},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2305.03934},
  doi          = {10.48550/ARXIV.2305.03934},
  eprinttype    = {arXiv},
  eprint       = {2305.03934},
  timestamp    = {Thu, 11 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2305-03934.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2305-12784,
  author       = {Hritvik Taneja and
                  Jason Kim and
                  Jie Jeff Xu and
                  Stephan van Schaik and
                  Daniel Genkin and
                  Yuval Yarom},
  title        = {Hot Pixels: Frequency, Power, and Temperature Attacks on GPUs and
                  {ARM} SoCs},
  journal      = {CoRR},
  volume       = {abs/2305.12784},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2305.12784},
  doi          = {10.48550/ARXIV.2305.12784},
  eprinttype    = {arXiv},
  eprint       = {2305.12784},
  timestamp    = {Fri, 26 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2305-12784.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2305-19586,
  author       = {Joel Kuepper and
                  Andres Erbsen and
                  Jason Gross and
                  Owen Conoly and
                  Chuyue Sun and
                  Samuel Tian and
                  David Wu and
                  Adam Chlipala and
                  Chitchanok Chuengsatiansup and
                  Daniel Genkin and
                  Markus Wagner and
                  Yuval Yarom},
  title        = {CryptOpt: Automatic Optimization of Straightline Code},
  journal      = {CoRR},
  volume       = {abs/2305.19586},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2305.19586},
  doi          = {10.48550/ARXIV.2305.19586},
  eprinttype    = {arXiv},
  eprint       = {2305.19586},
  timestamp    = {Wed, 07 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2305-19586.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NassiVINCJGTZE23,
  author       = {Ben Nassi and
                  Ofek Vayner and
                  Etay Iluz and
                  Dudi Nassi and
                  Or Hai Cohen and
                  Jan Jancar and
                  Daniel Genkin and
                  Eran Tromer and
                  Boris Zadov and
                  Yuval Elovici},
  title        = {Optical Cryptanalysis: Recovering Cryptographic Keys from Power {LED}
                  Light Fluctuations},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1068},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/1068},
  timestamp    = {Fri, 04 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/NassiVINCJGTZE23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/CohenTHGKOY22,
  author       = {Yaakov Cohen and
                  Kevin Sam Tharayil and
                  Arie Haenel and
                  Daniel Genkin and
                  Angelos D. Keromytis and
                  Yossi Oren and
                  Yuval Yarom},
  editor       = {Heng Yin and
                  Angelos Stavrou and
                  Cas Cremers and
                  Elaine Shi},
  title        = {HammerScope: Observing {DRAM} Power Consumption Using Rowhammer},
  booktitle    = {Proceedings of the 2022 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2022, Los Angeles, CA, USA, November
                  7-11, 2022},
  pages        = {547--561},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3548606.3560688},
  doi          = {10.1145/3548606.3560688},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/CohenTHGKOY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/FahrKKDLDGNPYA22,
  author       = {Michael Fahr and
                  Hunter Kippen and
                  Andrew Kwong and
                  Thinh Dang and
                  Jacob Lichtinger and
                  Dana Dachman{-}Soled and
                  Daniel Genkin and
                  Alexander Nelson and
                  Ray A. Perlner and
                  Arkady Yerukhimovich and
                  Daniel Apon},
  editor       = {Heng Yin and
                  Angelos Stavrou and
                  Cas Cremers and
                  Elaine Shi},
  title        = {When Frodo Flips: End-to-End Key Recovery on FrodoKEM via Rowhammer},
  booktitle    = {Proceedings of the 2022 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2022, Los Angeles, CA, USA, November
                  7-11, 2022},
  pages        = {979--993},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3548606.3560673},
  doi          = {10.1145/3548606.3560673},
  timestamp    = {Tue, 08 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/FahrKKDLDGNPYA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/DuGG22,
  author       = {Yang Du and
                  Daniel Genkin and
                  Paul Grubbs},
  editor       = {Yevgeniy Dodis and
                  Thomas Shrimpton},
  title        = {Snapshot-Oblivious RAMs: Sub-logarithmic Efficiency for Short Transcripts},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International
                  Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August
                  15-18, 2022, Proceedings, Part {IV}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13510},
  pages        = {152--181},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-15985-5\_6},
  doi          = {10.1007/978-3-031-15985-5\_6},
  timestamp    = {Wed, 19 Oct 2022 17:37:45 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/DuGG22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/Chuengsatiansup22,
  author       = {Chitchanok Chuengsatiansup and
                  Daniel Genkin and
                  Yuval Yarom and
                  Zhiyuan Zhang},
  editor       = {Steven D. Galbraith},
  title        = {Side-Channeling the Kalyna Key Expansion},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2022 - Cryptographers' Track at the
                  {RSA} Conference 2022, Virtual Event, March 1-2, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13161},
  pages        = {272--296},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-030-95312-6\_12},
  doi          = {10.1007/978-3-030-95312-6\_12},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/Chuengsatiansup22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/TobahKKGS22,
  author       = {Youssef Tobah and
                  Andrew Kwong and
                  Ingab Kang and
                  Daniel Genkin and
                  Kang G. Shin},
  title        = {SpecHammer: Combining Spectre and Rowhammer for New Speculative Attacks},
  booktitle    = {43rd {IEEE} Symposium on Security and Privacy, {SP} 2022, San Francisco,
                  CA, USA, May 22-26, 2022},
  pages        = {681--698},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/SP46214.2022.9833802},
  doi          = {10.1109/SP46214.2022.9833802},
  timestamp    = {Thu, 21 Sep 2023 15:57:27 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/TobahKKGS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/AgarwalOKYGRY22,
  author       = {Ayush Agarwal and
                  Sioli O'Connell and
                  Jason Kim and
                  Shaked Yehezkel and
                  Daniel Genkin and
                  Eyal Ronen and
                  Yuval Yarom},
  title        = {Spook.js: Attacking Chrome Strict Site Isolation via Speculative Execution},
  booktitle    = {43rd {IEEE} Symposium on Security and Privacy, {SP} 2022, San Francisco,
                  CA, USA, May 22-26, 2022},
  pages        = {699--715},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/SP46214.2022.9833711},
  doi          = {10.1109/SP46214.2022.9833711},
  timestamp    = {Thu, 21 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/AgarwalOKYGRY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/GenkinNST22,
  author       = {Daniel Genkin and
                  Noam Nissan and
                  Roei Schuster and
                  Eran Tromer},
  editor       = {Kevin R. B. Butler and
                  Kurt Thomas},
  title        = {Lend Me Your Ear: Passive Remote Physical Side Channels on PCs},
  booktitle    = {31st {USENIX} Security Symposium, {USENIX} Security 2022, Boston,
                  MA, USA, August 10-12, 2022},
  pages        = {4437--4454},
  publisher    = {{USENIX} Association},
  year         = {2022},
  url          = {https://www.usenix.org/conference/usenixsecurity22/presentation/genkin},
  timestamp    = {Tue, 18 Oct 2022 17:10:36 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/GenkinNST22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2201-11377,
  author       = {Daniel Genkin and
                  William Kosasih and
                  Fangfei Liu and
                  Anna Trikalinou and
                  Thomas Unterluggauer and
                  Yuval Yarom},
  title        = {CacheFX: {A} Framework for Evaluating Cache Security},
  journal      = {CoRR},
  volume       = {abs/2201.11377},
  year         = {2022},
  url          = {https://arxiv.org/abs/2201.11377},
  eprinttype    = {arXiv},
  eprint       = {2201.11377},
  timestamp    = {Tue, 01 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2201-11377.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2211-01109,
  author       = {Robert Dumitru and
                  Daniel Genkin and
                  Andrew Wabnitz and
                  Yuval Yarom},
  title        = {The Impostor Among {US(B):} Off-Path Injection Attacks on {USB} Communications},
  journal      = {CoRR},
  volume       = {abs/2211.01109},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2211.01109},
  doi          = {10.48550/ARXIV.2211.01109},
  eprinttype    = {arXiv},
  eprint       = {2211.01109},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2211-01109.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2211-10665,
  author       = {Joel Kuepper and
                  Andres Erbsen and
                  Jason Gross and
                  Owen Conoly and
                  Chuyue Sun and
                  Samuel Tian and
                  David Wu and
                  Adam Chlipala and
                  Chitchanok Chuengsatiansup and
                  Daniel Genkin and
                  Markus Wagner and
                  Yuval Yarom},
  title        = {CryptOpt: Verified Compilation with Random Program Search for Cryptographic
                  Primitives},
  journal      = {CoRR},
  volume       = {abs/2211.10665},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2211.10665},
  doi          = {10.48550/ARXIV.2211.10665},
  eprinttype    = {arXiv},
  eprint       = {2211.10665},
  timestamp    = {Thu, 24 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2211-10665.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ShivakumarBBCCG22,
  author       = {Basavesh Ammanaghatta Shivakumar and
                  Jack Barnes and
                  Gilles Barthe and
                  Sunjay Cauligi and
                  Chitchanok Chuengsatiansup and
                  Daniel Genkin and
                  Sioli O'Connell and
                  Peter Schwabe and
                  Rui Qi Sim and
                  Yuval Yarom},
  title        = {Spectre Declassified: Reading from the Right Place at the Wrong Time},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {426},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/426},
  timestamp    = {Thu, 21 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ShivakumarBBCCG22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DuGG22,
  author       = {Yang Du and
                  Daniel Genkin and
                  Paul Grubbs},
  title        = {Snapshot-Oblivious RAMs: Sub-Logarithmic Efficiency for Short Transcripts},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {858},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/858},
  timestamp    = {Tue, 27 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DuGG22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FahrKKDLDGNPYA22,
  author       = {Michael Fahr and
                  Hunter Kippen and
                  Andrew Kwong and
                  Thinh Dang and
                  Jacob Lichtinger and
                  Dana Dachman{-}Soled and
                  Daniel Genkin and
                  Alexander Nelson and
                  Ray A. Perlner and
                  Arkady Yerukhimovich and
                  Daniel Apon},
  title        = {When Frodo Flips: End-to-End Key Recovery on FrodoKEM via Rowhammer},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {952},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/952},
  timestamp    = {Tue, 27 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FahrKKDLDGNPYA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/GenkinY21,
  author       = {Daniel Genkin and
                  Yuval Yarom},
  title        = {Whack-a-Meltdown: Microarchitectural Security Games [Systems Attacks
                  and Defenses]},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {19},
  number       = {1},
  pages        = {95--98},
  year         = {2021},
  url          = {https://doi.org/10.1109/MSEC.2020.3036146},
  doi          = {10.1109/MSEC.2020.3036146},
  timestamp    = {Tue, 02 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/GenkinY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosp/AlamYWSZGYP21,
  author       = {Monjur Alam and
                  Baki Berkay Yilmaz and
                  Frank Werner and
                  Niels Samwel and
                  Alenka G. Zajic and
                  Daniel Genkin and
                  Yuval Yarom and
                  Milos Prvulovic},
  title        = {Nonce@Once: {A} Single-Trace {EM} Side Channel Attack on Several Constant-Time
                  Elliptic Curve Implementations in Mobile Platforms},
  booktitle    = {{IEEE} European Symposium on Security and Privacy, EuroS{\&}P
                  2021, Vienna, Austria, September 6-10, 2021},
  pages        = {507--522},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/EuroSP51992.2021.00041},
  doi          = {10.1109/EUROSP51992.2021.00041},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurosp/AlamYWSZGYP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/SchaikMKGY21,
  author       = {Stephan van Schaik and
                  Marina Minkin and
                  Andrew Kwong and
                  Daniel Genkin and
                  Yuval Yarom},
  title        = {CacheOut: Leaking Data on Intel CPUs via Cache Evictions},
  booktitle    = {42nd {IEEE} Symposium on Security and Privacy, {SP} 2021, San Francisco,
                  CA, USA, 24-27 May 2021},
  pages        = {339--354},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/SP40001.2021.00064},
  doi          = {10.1109/SP40001.2021.00064},
  timestamp    = {Thu, 21 Sep 2023 15:57:26 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/SchaikMKGY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/ShustermanAOGOY21,
  author       = {Anatoly Shusterman and
                  Ayush Agarwal and
                  Sioli O'Connell and
                  Daniel Genkin and
                  Yossi Oren and
                  Yuval Yarom},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {Prime+Probe 1, JavaScript 0: Overcoming Browser-based Side-Channel
                  Defenses},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {2863--2880},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/shusterman},
  timestamp    = {Mon, 20 Nov 2023 08:57:49 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/ShustermanAOGOY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@misc{DBLP:data/10/ShustermanAMOGOY21,
  author       = {Anatoly Shusterman and
                  Ayush Agrawal and
                  Giorgio Maone and
                  Sioli O'Connell and
                  Daniel Genkin and
                  Yossi Oren and
                  Yuval Yarom},
  title        = {Browser Based Side-Channel Defenses Datasets},
  publisher    = {{IEEE} DataPort},
  year         = {2021},
  month        = oct,
  howpublished = {\url{https://doi.org/10.21227/f8kk-xq86}},
  note         = {Accessed on YYYY-MM-DD.},
  url          = {https://doi.org/10.21227/f8kk-xq86},
  doi          = {10.21227/F8KK-XQ86},
  timestamp    = {Wed, 15 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/data/10/ShustermanAMOGOY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2103-04952,
  author       = {Anatoly Shusterman and
                  Ayush Agarwal and
                  Sioli O'Connell and
                  Daniel Genkin and
                  Yossi Oren and
                  Yuval Yarom},
  title        = {Prime+Probe 1, JavaScript 0: Overcoming Browser-based Side-Channel
                  Defenses},
  journal      = {CoRR},
  volume       = {abs/2103.04952},
  year         = {2021},
  url          = {https://arxiv.org/abs/2103.04952},
  eprinttype    = {arXiv},
  eprint       = {2103.04952},
  timestamp    = {Mon, 15 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2103-04952.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cacm/LippSGPHHMKGYHS20,
  author       = {Moritz Lipp and
                  Michael Schwarz and
                  Daniel Gruss and
                  Thomas Prescher and
                  Werner Haas and
                  Jann Horn and
                  Stefan Mangard and
                  Paul Kocher and
                  Daniel Genkin and
                  Yuval Yarom and
                  Mike Hamburg and
                  Raoul Strackx},
  title        = {Meltdown: reading kernel memory from user space},
  journal      = {Commun. {ACM}},
  volume       = {63},
  number       = {6},
  pages        = {46--56},
  year         = {2020},
  url          = {https://doi.org/10.1145/3357033},
  doi          = {10.1145/3357033},
  timestamp    = {Thu, 25 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cacm/LippSGPHHMKGYHS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cacm/KocherHFGGHHLMP20,
  author       = {Paul Kocher and
                  Jann Horn and
                  Anders Fogh and
                  Daniel Genkin and
                  Daniel Gruss and
                  Werner Haas and
                  Mike Hamburg and
                  Moritz Lipp and
                  Stefan Mangard and
                  Thomas Prescher and
                  Michael Schwarz and
                  Yuval Yarom},
  title        = {Spectre attacks: exploiting speculative execution},
  journal      = {Commun. {ACM}},
  volume       = {63},
  number       = {7},
  pages        = {93--101},
  year         = {2020},
  url          = {https://doi.org/10.1145/3399742},
  doi          = {10.1145/3399742},
  timestamp    = {Tue, 14 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cacm/KocherHFGGHHLMP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/GenkinPSYZ20,
  author       = {Daniel Genkin and
                  Romain Poussier and
                  Rui Qi Sim and
                  Yuval Yarom and
                  Yuanjing Zhao},
  title        = {Cache vs. Key-Dependency: Side Channeling an Implementation of Pilsung},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2020},
  number       = {1},
  pages        = {231--255},
  year         = {2020},
  url          = {https://doi.org/10.13154/tches.v2020.i1.231-255},
  doi          = {10.13154/TCHES.V2020.I1.231-255},
  timestamp    = {Thu, 06 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tches/GenkinPSYZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/BulckM0LMGYSGP20,
  author       = {Jo Van Bulck and
                  Daniel Moghimi and
                  Michael Schwarz and
                  Moritz Lipp and
                  Marina Minkin and
                  Daniel Genkin and
                  Yuval Yarom and
                  Berk Sunar and
                  Daniel Gruss and
                  Frank Piessens},
  title        = {{LVI:} Hijacking Transient Execution through Microarchitectural Load
                  Value Injection},
  booktitle    = {2020 {IEEE} Symposium on Security and Privacy, {SP} 2020, San Francisco,
                  CA, USA, May 18-21, 2020},
  pages        = {54--72},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/SP40000.2020.00089},
  doi          = {10.1109/SP40000.2020.00089},
  timestamp    = {Thu, 21 Sep 2023 15:57:24 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/BulckM0LMGYSGP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/KwongGGY20,
  author       = {Andrew Kwong and
                  Daniel Genkin and
                  Daniel Gruss and
                  Yuval Yarom},
  title        = {RAMBleed: Reading Bits in Memory Without Accessing Them},
  booktitle    = {2020 {IEEE} Symposium on Security and Privacy, {SP} 2020, San Francisco,
                  CA, USA, May 18-21, 2020},
  pages        = {695--711},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/SP40000.2020.00020},
  doi          = {10.1109/SP40000.2020.00020},
  timestamp    = {Thu, 21 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/KwongGGY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/CohneyKPGHRY20,
  author       = {Shaanan Cohney and
                  Andrew Kwong and
                  Shahar Paz and
                  Daniel Genkin and
                  Nadia Heninger and
                  Eyal Ronen and
                  Yuval Yarom},
  title        = {Pseudorandom Black Swans: Cache Attacks on CTR{\_}DRBG},
  booktitle    = {2020 {IEEE} Symposium on Security and Privacy, {SP} 2020, San Francisco,
                  CA, USA, May 18-21, 2020},
  pages        = {1241--1258},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/SP40000.2020.00046},
  doi          = {10.1109/SP40000.2020.00046},
  timestamp    = {Thu, 21 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/CohneyKPGHRY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/SugawaraCRGF20,
  author       = {Takeshi Sugawara and
                  Benjamin Cyr and
                  Sara Rampazzi and
                  Daniel Genkin and
                  Kevin Fu},
  editor       = {Srdjan Capkun and
                  Franziska Roesner},
  title        = {Light Commands: Laser-Based Audio Injection Attacks on Voice-Controllable
                  Systems},
  booktitle    = {29th {USENIX} Security Symposium, {USENIX} Security 2020, August 12-14,
                  2020},
  pages        = {2631--2648},
  publisher    = {{USENIX} Association},
  year         = {2020},
  url          = {https://www.usenix.org/conference/usenixsecurity20/presentation/sugawara},
  timestamp    = {Fri, 26 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/SugawaraCRGF20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2006-11946,
  author       = {Takeshi Sugawara and
                  Benjamin Cyr and
                  Sara Rampazzi and
                  Daniel Genkin and
                  Kevin Fu},
  title        = {Light Commands: Laser-Based Audio Injection Attacks on Voice-Controllable
                  Systems},
  journal      = {CoRR},
  volume       = {abs/2006.11946},
  year         = {2020},
  url          = {https://arxiv.org/abs/2006.11946},
  eprinttype    = {arXiv},
  eprint       = {2006.11946},
  timestamp    = {Fri, 26 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2006-11946.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2006-13353,
  author       = {Stephan van Schaik and
                  Marina Minkin and
                  Andrew Kwong and
                  Daniel Genkin and
                  Yuval Yarom},
  title        = {CacheOut: Leaking Data on Intel CPUs via Cache Evictions},
  journal      = {CoRR},
  volume       = {abs/2006.13353},
  year         = {2020},
  url          = {https://arxiv.org/abs/2006.13353},
  eprinttype    = {arXiv},
  eprint       = {2006.13353},
  timestamp    = {Wed, 01 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2006-13353.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/micro/BulckMWGKPSWYS19,
  author       = {Jo Van Bulck and
                  Marina Minkin and
                  Ofir Weisse and
                  Daniel Genkin and
                  Baris Kasikci and
                  Frank Piessens and
                  Mark Silberstein and
                  Thomas F. Wenisch and
                  Yuval Yarom and
                  Raoul Strackx},
  title        = {Breaking Virtual Memory Protection and the {SGX} Ecosystem with Foreshadow},
  journal      = {{IEEE} Micro},
  volume       = {39},
  number       = {3},
  pages        = {66--74},
  year         = {2019},
  url          = {https://doi.org/10.1109/MM.2019.2910104},
  doi          = {10.1109/MM.2019.2910104},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/micro/BulckMWGKPSWYS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/CanellaGGGLMMP019,
  author       = {Claudio Canella and
                  Daniel Genkin and
                  Lukas Giner and
                  Daniel Gruss and
                  Moritz Lipp and
                  Marina Minkin and
                  Daniel Moghimi and
                  Frank Piessens and
                  Michael Schwarz and
                  Berk Sunar and
                  Jo Van Bulck and
                  Yuval Yarom},
  editor       = {Lorenzo Cavallaro and
                  Johannes Kinder and
                  XiaoFeng Wang and
                  Jonathan Katz},
  title        = {Fallout: Leaking Data on Meltdown-resistant CPUs},
  booktitle    = {Proceedings of the 2019 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2019, London, UK, November 11-15, 2019},
  pages        = {769--784},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3319535.3363219},
  doi          = {10.1145/3319535.3363219},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/CanellaGGGLMMP019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/KocherHFGGHHLM019,
  author       = {Paul Kocher and
                  Jann Horn and
                  Anders Fogh and
                  Daniel Genkin and
                  Daniel Gruss and
                  Werner Haas and
                  Mike Hamburg and
                  Moritz Lipp and
                  Stefan Mangard and
                  Thomas Prescher and
                  Michael Schwarz and
                  Yuval Yarom},
  title        = {Spectre Attacks: Exploiting Speculative Execution},
  booktitle    = {2019 {IEEE} Symposium on Security and Privacy, {SP} 2019, San Francisco,
                  CA, USA, May 19-23, 2019},
  pages        = {1--19},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/SP.2019.00002},
  doi          = {10.1109/SP.2019.00002},
  timestamp    = {Thu, 25 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/KocherHFGGHHLM019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/RonenGGSWY19,
  author       = {Eyal Ronen and
                  Robert Gillham and
                  Daniel Genkin and
                  Adi Shamir and
                  David Wong and
                  Yuval Yarom},
  title        = {The 9 Lives of Bleichenbacher's {CAT:} New Cache ATtacks on {TLS}
                  Implementations},
  booktitle    = {2019 {IEEE} Symposium on Security and Privacy, {SP} 2019, San Francisco,
                  CA, USA, May 19-23, 2019},
  pages        = {435--452},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/SP.2019.00062},
  doi          = {10.1109/SP.2019.00062},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/RonenGGSWY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/GenkinPST19,
  author       = {Daniel Genkin and
                  Mihir Pattani and
                  Roei Schuster and
                  Eran Tromer},
  title        = {Synesthesia: Detecting Screen Content via Remote Acoustic Side Channels},
  booktitle    = {2019 {IEEE} Symposium on Security and Privacy, {SP} 2019, San Francisco,
                  CA, USA, May 19-23, 2019},
  pages        = {853--869},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/SP.2019.00074},
  doi          = {10.1109/SP.2019.00074},
  timestamp    = {Tue, 24 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/GenkinPST19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1905-12701,
  author       = {Marina Minkin and
                  Daniel Moghimi and
                  Moritz Lipp and
                  Michael Schwarz and
                  Jo Van Bulck and
                  Daniel Genkin and
                  Daniel Gruss and
                  Frank Piessens and
                  Berk Sunar and
                  Yuval Yarom},
  title        = {Fallout: Reading Kernel Writes From User Space},
  journal      = {CoRR},
  volume       = {abs/1905.12701},
  year         = {2019},
  url          = {http://arxiv.org/abs/1905.12701},
  eprinttype    = {arXiv},
  eprint       = {1905.12701},
  timestamp    = {Mon, 03 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1905-12701.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CohneyKPGHRY19,
  author       = {Shaanan Cohney and
                  Andrew Kwong and
                  Shahar Paz and
                  Daniel Genkin and
                  Nadia Heninger and
                  Eyal Ronen and
                  Yuval Yarom},
  title        = {Pseudorandom Black Swans: Cache Attacks on CTR{\_}DRBG},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {996},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/996},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CohneyKPGHRY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cacm/GenkinPP18,
  author       = {Daniel Genkin and
                  Dimitrios Papadopoulos and
                  Charalampos Papamanthou},
  title        = {Privacy in decentralized cryptocurrencies},
  journal      = {Commun. {ACM}},
  volume       = {61},
  number       = {6},
  pages        = {78--88},
  year         = {2018},
  url          = {https://doi.org/10.1145/3132696},
  doi          = {10.1145/3132696},
  timestamp    = {Mon, 07 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cacm/GenkinPP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/DallMEGHMY18,
  author       = {Fergus Dall and
                  Gabrielle De Micheli and
                  Thomas Eisenbarth and
                  Daniel Genkin and
                  Nadia Heninger and
                  Ahmad Moghimi and
                  Yuval Yarom},
  title        = {CacheQuote: Efficiently Recovering Long-term Secrets of {SGX} {EPID}
                  via Cache Attacks},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2018},
  number       = {2},
  pages        = {171--191},
  year         = {2018},
  url          = {https://doi.org/10.13154/tches.v2018.i2.171-191},
  doi          = {10.13154/TCHES.V2018.I2.171-191},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tches/DallMEGHMY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/GenkinPTY18,
  author       = {Daniel Genkin and
                  Lev Pachmanov and
                  Eran Tromer and
                  Yuval Yarom},
  editor       = {Bart Preneel and
                  Frederik Vercauteren},
  title        = {Drive-By Key-Extraction Cache Attacks from Portable Code},
  booktitle    = {Applied Cryptography and Network Security - 16th International Conference,
                  {ACNS} 2018, Leuven, Belgium, July 2-4, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10892},
  pages        = {83--102},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-93387-0\_5},
  doi          = {10.1007/978-3-319-93387-0\_5},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/GenkinPTY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/GenkinGR18,
  author       = {Daniel Genkin and
                  S. Dov Gordon and
                  Samuel Ranellucci},
  editor       = {Bart Preneel and
                  Frederik Vercauteren},
  title        = {Best of Both Worlds in Secure Computation, with Low Communication
                  Overhead},
  booktitle    = {Applied Cryptography and Network Security - 16th International Conference,
                  {ACNS} 2018, Leuven, Belgium, July 2-4, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10892},
  pages        = {340--359},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-93387-0\_18},
  doi          = {10.1007/978-3-319-93387-0\_18},
  timestamp    = {Wed, 13 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/GenkinGR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/ChidaGHIKLN18,
  author       = {Koji Chida and
                  Daniel Genkin and
                  Koki Hamada and
                  Dai Ikarashi and
                  Ryo Kikuchi and
                  Yehuda Lindell and
                  Ariel Nof},
  editor       = {Hovav Shacham and
                  Alexandra Boldyreva},
  title        = {Fast Large-Scale Honest-Majority {MPC} for Malicious Adversaries},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018,
                  Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10993},
  pages        = {34--64},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-96878-0\_2},
  doi          = {10.1007/978-3-319-96878-0\_2},
  timestamp    = {Mon, 16 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/ChidaGHIKLN18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csr/GenkinKP18,
  author       = {Daniel Genkin and
                  Michael Kaminski and
                  Liat Peterfreund},
  editor       = {Fedor V. Fomin and
                  Vladimir V. Podolskii},
  title        = {Closure Under Reversal of Languages over Infinite Alphabets},
  booktitle    = {Computer Science - Theory and Applications - 13th International Computer
                  Science Symposium in Russia, {CSR} 2018, Moscow, Russia, June 6-10,
                  2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10846},
  pages        = {145--156},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-90530-3\_13},
  doi          = {10.1007/978-3-319-90530-3\_13},
  timestamp    = {Tue, 14 May 2019 10:00:51 +0200},
  biburl       = {https://dblp.org/rec/conf/csr/GenkinKP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/GrussLSGJOSY18,
  author       = {Daniel Gruss and
                  Moritz Lipp and
                  Michael Schwarz and
                  Daniel Genkin and
                  Jonas Juffinger and
                  Sioli O'Connell and
                  Wolfgang Schoechl and
                  Yuval Yarom},
  title        = {Another Flip in the Wall of Rowhammer Defenses},
  booktitle    = {2018 {IEEE} Symposium on Security and Privacy, {SP} 2018, Proceedings,
                  21-23 May 2018, San Francisco, California, {USA}},
  pages        = {245--261},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://doi.org/10.1109/SP.2018.00031},
  doi          = {10.1109/SP.2018.00031},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/GrussLSGJOSY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/ZhangGKPP18,
  author       = {Yupeng Zhang and
                  Daniel Genkin and
                  Jonathan Katz and
                  Dimitrios Papadopoulos and
                  Charalampos Papamanthou},
  title        = {vRAM: Faster Verifiable {RAM} with Program-Independent Preprocessing},
  booktitle    = {2018 {IEEE} Symposium on Security and Privacy, {SP} 2018, Proceedings,
                  21-23 May 2018, San Francisco, California, {USA}},
  pages        = {908--925},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://doi.org/10.1109/SP.2018.00013},
  doi          = {10.1109/SP.2018.00013},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/ZhangGKPP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/Lipp0G0HFHMKGYH18,
  author       = {Moritz Lipp and
                  Michael Schwarz and
                  Daniel Gruss and
                  Thomas Prescher and
                  Werner Haas and
                  Anders Fogh and
                  Jann Horn and
                  Stefan Mangard and
                  Paul Kocher and
                  Daniel Genkin and
                  Yuval Yarom and
                  Mike Hamburg},
  editor       = {William Enck and
                  Adrienne Porter Felt},
  title        = {Meltdown: Reading Kernel Memory from User Space},
  booktitle    = {27th {USENIX} Security Symposium, {USENIX} Security 2018, Baltimore,
                  MD, USA, August 15-17, 2018},
  pages        = {973--990},
  publisher    = {{USENIX} Association},
  year         = {2018},
  url          = {https://www.usenix.org/conference/usenixsecurity18/presentation/lipp},
  timestamp    = {Mon, 01 Feb 2021 08:43:20 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/Lipp0G0HFHMKGYH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/BulckMWGKPSWYS18,
  author       = {Jo Van Bulck and
                  Marina Minkin and
                  Ofir Weisse and
                  Daniel Genkin and
                  Baris Kasikci and
                  Frank Piessens and
                  Mark Silberstein and
                  Thomas F. Wenisch and
                  Yuval Yarom and
                  Raoul Strackx},
  editor       = {William Enck and
                  Adrienne Porter Felt},
  title        = {Foreshadow: Extracting the Keys to the Intel {SGX} Kingdom with Transient
                  Out-of-Order Execution},
  booktitle    = {27th {USENIX} Security Symposium, {USENIX} Security 2018, Baltimore,
                  MD, USA, August 15-17, 2018},
  pages        = {991--1008},
  publisher    = {{USENIX} Association},
  year         = {2018},
  url          = {https://www.usenix.org/conference/usenixsecurity18/presentation/bulck},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/BulckMWGKPSWYS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1801-01203,
  author       = {Paul Kocher and
                  Daniel Genkin and
                  Daniel Gruss and
                  Werner Haas and
                  Mike Hamburg and
                  Moritz Lipp and
                  Stefan Mangard and
                  Thomas Prescher and
                  Michael Schwarz and
                  Yuval Yarom},
  title        = {Spectre Attacks: Exploiting Speculative Execution},
  journal      = {CoRR},
  volume       = {abs/1801.01203},
  year         = {2018},
  url          = {http://arxiv.org/abs/1801.01203},
  eprinttype    = {arXiv},
  eprint       = {1801.01203},
  timestamp    = {Thu, 25 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1801-01203.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1801-01207,
  author       = {Moritz Lipp and
                  Michael Schwarz and
                  Daniel Gruss and
                  Thomas Prescher and
                  Werner Haas and
                  Stefan Mangard and
                  Paul Kocher and
                  Daniel Genkin and
                  Yuval Yarom and
                  Mike Hamburg},
  title        = {Meltdown},
  journal      = {CoRR},
  volume       = {abs/1801.01207},
  year         = {2018},
  url          = {http://arxiv.org/abs/1801.01207},
  eprinttype    = {arXiv},
  eprint       = {1801.01207},
  timestamp    = {Thu, 25 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1801-01207.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1809-02629,
  author       = {Daniel Genkin and
                  Mihir Pattani and
                  Roei Schuster and
                  Eran Tromer},
  title        = {Synesthesia: Detecting Screen Content via Remote Acoustic Side Channels},
  journal      = {CoRR},
  volume       = {abs/1809.02629},
  year         = {2018},
  url          = {http://arxiv.org/abs/1809.02629},
  eprinttype    = {arXiv},
  eprint       = {1809.02629},
  timestamp    = {Fri, 05 Oct 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1809-02629.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GenkinPTY18,
  author       = {Daniel Genkin and
                  Lev Pachmanov and
                  Eran Tromer and
                  Yuval Yarom},
  title        = {Drive-by Key-Extraction Cache Attacks from Portable Code},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {119},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/119},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GenkinPTY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChidaGHIKLN18,
  author       = {Koji Chida and
                  Daniel Genkin and
                  Koki Hamada and
                  Dai Ikarashi and
                  Ryo Kikuchi and
                  Yehuda Lindell and
                  Ariel Nof},
  title        = {Fast Large-Scale Honest-Majority {MPC} for Malicious Adversaries},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {570},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/570},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChidaGHIKLN18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/RonenGGSWY18,
  author       = {Eyal Ronen and
                  Robert Gillham and
                  Daniel Genkin and
                  Adi Shamir and
                  David Wong and
                  Yuval Yarom},
  title        = {The 9 Lives of Bleichenbacher's {CAT:} New Cache ATtacks on {TLS}
                  Implementations},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1173},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1173},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/RonenGGSWY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:tr/meltdown/m18,
  author       = {Moritz Lipp and
                  Michael Schwarz and
                  Daniel Gruss and
                  Thomas Prescher and
                  Werner Haas and
                  Stefan Mangard and
                  Paul Kocher and
                  Daniel Genkin and
                  Yuval Yarom and
                  Mike Hamburg},
  title        = {Meltdown},
  journal      = {meltdownattack.com},
  year         = {2018},
  url          = {https://meltdownattack.com/meltdown.pdf},
  timestamp    = {Thu, 25 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/tr/meltdown/m18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:tr/meltdown/s18,
  author       = {Paul Kocher and
                  Daniel Genkin and
                  Daniel Gruss and
                  Werner Haas and
                  Mike Hamburg and
                  Moritz Lipp and
                  Stefan Mangard and
                  Thomas Prescher and
                  Michael Schwarz and
                  Yuval Yarom},
  title        = {Spectre Attacks: Exploiting Speculative Execution},
  journal      = {meltdownattack.com},
  year         = {2018},
  url          = {https://spectreattack.com/spectre.pdf},
  timestamp    = {Thu, 25 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/tr/meltdown/s18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/YaromGH17,
  author       = {Yuval Yarom and
                  Daniel Genkin and
                  Nadia Heninger},
  title        = {CacheBleed: a timing attack on OpenSSL constant-time {RSA}},
  journal      = {J. Cryptogr. Eng.},
  volume       = {7},
  number       = {2},
  pages        = {99--112},
  year         = {2017},
  url          = {https://doi.org/10.1007/s13389-017-0152-y},
  doi          = {10.1007/S13389-017-0152-Y},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/YaromGH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/GenkinST17,
  author       = {Daniel Genkin and
                  Adi Shamir and
                  Eran Tromer},
  title        = {Acoustic Cryptanalysis},
  journal      = {J. Cryptol.},
  volume       = {30},
  number       = {2},
  pages        = {392--443},
  year         = {2017},
  url          = {https://doi.org/10.1007/s00145-015-9224-2},
  doi          = {10.1007/S00145-015-9224-2},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/GenkinST17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/GenkinVY17,
  author       = {Daniel Genkin and
                  Luke Valenta and
                  Yuval Yarom},
  editor       = {Bhavani Thuraisingham and
                  David Evans and
                  Tal Malkin and
                  Dongyan Xu},
  title        = {May the Fourth Be With You: {A} Microarchitectural Side Channel Attack
                  on Several Real-World Applications of Curve25519},
  booktitle    = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 -
                  November 03, 2017},
  pages        = {845--858},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3133956.3134029},
  doi          = {10.1145/3133956.3134029},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/GenkinVY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/BernsteinBGBHLV17,
  author       = {Daniel J. Bernstein and
                  Joachim Breitner and
                  Daniel Genkin and
                  Leon Groot Bruinderink and
                  Nadia Heninger and
                  Tanja Lange and
                  Christine van Vredendaal and
                  Yuval Yarom},
  editor       = {Wieland Fischer and
                  Naofumi Homma},
  title        = {Sliding Right into Disaster: Left-to-Right Sliding Windows Leak},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2017 - 19th International
                  Conference, Taipei, Taiwan, September 25-28, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10529},
  pages        = {555--576},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-66787-4\_27},
  doi          = {10.1007/978-3-319-66787-4\_27},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/BernsteinBGBHLV17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/Ben-SassonBCGGH17,
  author       = {Eli Ben{-}Sasson and
                  Iddo Bentov and
                  Alessandro Chiesa and
                  Ariel Gabizon and
                  Daniel Genkin and
                  Matan Hamilis and
                  Evgenya Pergament and
                  Michael Riabzev and
                  Mark Silberstein and
                  Eran Tromer and
                  Madars Virza},
  editor       = {Jean{-}S{\'{e}}bastien Coron and
                  Jesper Buus Nielsen},
  title        = {Computational Integrity with a Public Random String from Quasi-Linear
                  PCPs},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2017 - 36th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Paris, France, April 30 - May 4, 2017, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10212},
  pages        = {551--579},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-56617-7\_19},
  doi          = {10.1007/978-3-319-56617-7\_19},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/Ben-SassonBCGGH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/ZhangGKPP17,
  author       = {Yupeng Zhang and
                  Daniel Genkin and
                  Jonathan Katz and
                  Dimitrios Papadopoulos and
                  Charalampos Papamanthou},
  title        = {vSQL: Verifying Arbitrary {SQL} Queries over Dynamic Outsourced Databases},
  booktitle    = {2017 {IEEE} Symposium on Security and Privacy, {SP} 2017, San Jose,
                  CA, USA, May 22-26, 2017},
  pages        = {863--880},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/SP.2017.43},
  doi          = {10.1109/SP.2017.43},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/ZhangGKPP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/GenkinIW17,
  author       = {Daniel Genkin and
                  Yuval Ishai and
                  Mor Weiss},
  editor       = {Yael Kalai and
                  Leonid Reyzin},
  title        = {How to Construct a Leakage-Resilient (Stateless) Trusted Party},
  booktitle    = {Theory of Cryptography - 15th International Conference, {TCC} 2017,
                  Baltimore, MD, USA, November 12-15, 2017, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10678},
  pages        = {209--244},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-70503-3\_7},
  doi          = {10.1007/978-3-319-70503-3\_7},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/GenkinIW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/SuGRY17,
  author       = {Yang Su and
                  Daniel Genkin and
                  Damith Chinthana Ranasinghe and
                  Yuval Yarom},
  editor       = {Engin Kirda and
                  Thomas Ristenpart},
  title        = {{USB} Snooping Made Easy: Crosstalk Leakage Attacks on {USB} Hubs},
  booktitle    = {26th {USENIX} Security Symposium, {USENIX} Security 2017, Vancouver,
                  BC, Canada, August 16-18, 2017},
  pages        = {1145--1161},
  publisher    = {{USENIX} Association},
  year         = {2017},
  url          = {https://www.usenix.org/conference/usenixsecurity17/technical-sessions/presentation/su},
  timestamp    = {Mon, 01 Feb 2021 08:42:59 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/SuGRY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1710-00551,
  author       = {Daniel Gruss and
                  Moritz Lipp and
                  Michael Schwarz and
                  Daniel Genkin and
                  Jonas Juffinger and
                  Sioli O'Connell and
                  Wolfgang Schoechl and
                  Yuval Yarom},
  title        = {Another Flip in the Wall of Rowhammer Defenses},
  journal      = {CoRR},
  volume       = {abs/1710.00551},
  year         = {2017},
  url          = {http://arxiv.org/abs/1710.00551},
  eprinttype    = {arXiv},
  eprint       = {1710.00551},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1710-00551.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BernsteinBGBHLV17,
  author       = {Daniel J. Bernstein and
                  Joachim Breitner and
                  Daniel Genkin and
                  Leon Groot Bruinderink and
                  Nadia Heninger and
                  Tanja Lange and
                  Christine van Vredendaal and
                  Yuval Yarom},
  title        = {Sliding right into disaster: Left-to-right sliding windows leak},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {627},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/627},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BernsteinBGBHLV17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GenkinVY17,
  author       = {Daniel Genkin and
                  Luke Valenta and
                  Yuval Yarom},
  title        = {May the Fourth Be With You: {A} Microarchitectural Side Channel Attack
                  on Several Real-World Applications of Curve25519},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {806},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/806},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GenkinVY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GenkinIW17,
  author       = {Daniel Genkin and
                  Yuval Ishai and
                  Mor Weiss},
  title        = {How to Construct a Leakage-Resilient (Stateless) Trusted Party},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {926},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/926},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GenkinIW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ZhangGKPP17,
  author       = {Yupeng Zhang and
                  Daniel Genkin and
                  Jonathan Katz and
                  Dimitrios Papadopoulos and
                  Charalampos Papamanthou},
  title        = {vSQL: Verifying Arbitrary {SQL} Queries over Dynamic Outsourced Databases},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1145},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1145},
  timestamp    = {Mon, 07 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/ZhangGKPP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ZhangGKPP17a,
  author       = {Yupeng Zhang and
                  Daniel Genkin and
                  Jonathan Katz and
                  Dimitrios Papadopoulos and
                  Charalampos Papamanthou},
  title        = {A Zero-Knowledge Version of vSQL},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1146},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1146},
  timestamp    = {Mon, 07 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/ZhangGKPP17a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/il/Genkin16,
  author       = {Daniel Genkin},
  title        = {Secure Computation in Hostile Environments},
  school       = {Technion - Israel Institute of Technology, Israel},
  year         = {2016},
  url          = {https://www.cs.technion.ac.il/users/wwwb/cgi-bin/tr-info.cgi/2016/PHD/PHD-2016-08},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/phd/il/Genkin16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cacm/GenkinPST16,
  author       = {Daniel Genkin and
                  Lev Pachmanov and
                  Itamar Pipman and
                  Adi Shamir and
                  Eran Tromer},
  title        = {Physical key extraction attacks on PCs},
  journal      = {Commun. {ACM}},
  volume       = {59},
  number       = {6},
  pages        = {70--79},
  year         = {2016},
  url          = {https://doi.org/10.1145/2851486},
  doi          = {10.1145/2851486},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cacm/GenkinPST16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/GenkinPPTY16,
  author       = {Daniel Genkin and
                  Lev Pachmanov and
                  Itamar Pipman and
                  Eran Tromer and
                  Yuval Yarom},
  editor       = {Edgar R. Weippl and
                  Stefan Katzenbeisser and
                  Christopher Kruegel and
                  Andrew C. Myers and
                  Shai Halevi},
  title        = {{ECDSA} Key Extraction from Mobile Devices via Nonintrusive Physical
                  Side Channels},
  booktitle    = {Proceedings of the 2016 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, Vienna, Austria, October 24-28, 2016},
  pages        = {1626--1638},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2976749.2978353},
  doi          = {10.1145/2976749.2978353},
  timestamp    = {Tue, 10 Nov 2020 20:00:49 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/GenkinPPTY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/YaromGH16,
  author       = {Yuval Yarom and
                  Daniel Genkin and
                  Nadia Heninger},
  editor       = {Benedikt Gierlichs and
                  Axel Y. Poschmann},
  title        = {CacheBleed: {A} Timing Attack on OpenSSL Constant Time {RSA}},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2016 - 18th International
                  Conference, Santa Barbara, CA, USA, August 17-19, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9813},
  pages        = {346--367},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53140-2\_17},
  doi          = {10.1007/978-3-662-53140-2\_17},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/YaromGH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/GenkinPPT16,
  author       = {Daniel Genkin and
                  Lev Pachmanov and
                  Itamar Pipman and
                  Eran Tromer},
  editor       = {Kazue Sako},
  title        = {{ECDH} Key-Extraction via Low-Bandwidth Electromagnetic Attacks on
                  PCs},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2016 - The Cryptographers' Track at
                  the {RSA} Conference 2016, San Francisco, CA, USA, February 29 - March
                  4, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9610},
  pages        = {219--235},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-29485-8\_13},
  doi          = {10.1007/978-3-319-29485-8\_13},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/GenkinPPT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/GenkinIW16,
  author       = {Daniel Genkin and
                  Yuval Ishai and
                  Mor Weiss},
  editor       = {Martin Hirt and
                  Adam D. Smith},
  title        = {Binary {AMD} Circuits from Secure Multiparty Computation},
  booktitle    = {Theory of Cryptography - 14th International Conference, {TCC} 2016-B,
                  Beijing, China, October 31 - November 3, 2016, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9985},
  pages        = {336--366},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53641-4\_14},
  doi          = {10.1007/978-3-662-53641-4\_14},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/GenkinIW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GenkinPPT16,
  author       = {Daniel Genkin and
                  Lev Pachmanov and
                  Itamar Pipman and
                  Eran Tromer},
  title        = {{ECDH} Key-Extraction via Low-Bandwidth Electromagnetic Attacks on
                  PCs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {129},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/129},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GenkinPPT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/YaromGH16,
  author       = {Yuval Yarom and
                  Daniel Genkin and
                  Nadia Heninger},
  title        = {CacheBleed: {A} Timing Attack on OpenSSL Constant Time {RSA}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {224},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/224},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/YaromGH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GenkinPPTY16,
  author       = {Daniel Genkin and
                  Lev Pachmanov and
                  Itamar Pipman and
                  Eran Tromer and
                  Yuval Yarom},
  title        = {{ECDSA} Key Extraction from Mobile Devices via Nonintrusive Physical
                  Side Channels},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {230},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/230},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GenkinPPTY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Ben-SassonBCGGH16,
  author       = {Eli Ben{-}Sasson and
                  Iddo Bentov and
                  Alessandro Chiesa and
                  Ariel Gabizon and
                  Daniel Genkin and
                  Matan Hamilis and
                  Evgenya Pergament and
                  Michael Riabzev and
                  Mark Silberstein and
                  Eran Tromer and
                  Madars Virza},
  title        = {Computational integrity with a public random string from quasi-linear
                  PCPs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {646},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/646},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Ben-SassonBCGGH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GenkinIW16,
  author       = {Daniel Genkin and
                  Yuval Ishai and
                  Mor Weiss},
  title        = {Binary {AMD} Circuits from Secure Multiparty Computation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {809},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/809},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GenkinIW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/GenkinPT15,
  author       = {Daniel Genkin and
                  Itamar Pipman and
                  Eran Tromer},
  title        = {Get your hands off my laptop: physical side-channel key-extraction
                  attacks on PCs - Extended version},
  journal      = {J. Cryptogr. Eng.},
  volume       = {5},
  number       = {2},
  pages        = {95--112},
  year         = {2015},
  url          = {https://doi.org/10.1007/s13389-015-0100-7},
  doi          = {10.1007/S13389-015-0100-7},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/GenkinPT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/GenkinPPT15,
  author       = {Daniel Genkin and
                  Lev Pachmanov and
                  Itamar Pipman and
                  Eran Tromer},
  editor       = {Tim G{\"{u}}neysu and
                  Helena Handschuh},
  title        = {Stealing Keys from PCs Using a Radio: Cheap Electromagnetic Attacks
                  on Windowed Exponentiation},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2015 - 17th International
                  Workshop, Saint-Malo, France, September 13-16, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9293},
  pages        = {207--228},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-48324-4\_11},
  doi          = {10.1007/978-3-662-48324-4\_11},
  timestamp    = {Thu, 31 Oct 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ches/GenkinPPT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/GenkinIP15,
  author       = {Daniel Genkin and
                  Yuval Ishai and
                  Antigoni Polychroniadou},
  editor       = {Rosario Gennaro and
                  Matthew Robshaw},
  title        = {Efficient Multi-party Computation: From Passive to Active Security
                  via Secure {SIMD} Circuits},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9216},
  pages        = {721--741},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-48000-7\_35},
  doi          = {10.1007/978-3-662-48000-7\_35},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/GenkinIP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GenkinIPST15,
  author       = {Daniel Genkin and
                  Yuval Ishai and
                  Manoj Prabhakaran and
                  Amit Sahai and
                  Eran Tromer},
  title        = {Circuits Resilient to Additive Attacks with Applications to Secure
                  Computation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {154},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/154},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GenkinIPST15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GenkinPPT15,
  author       = {Daniel Genkin and
                  Lev Pachmanov and
                  Itamar Pipman and
                  Eran Tromer},
  title        = {Stealing Keys from PCs using a Radio: Cheap Electromagnetic Attacks
                  on Windowed Exponentiation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {170},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/170},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GenkinPPT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcs/GenkinKP14,
  author       = {Daniel Genkin and
                  Michael Kaminski and
                  Liat Peterfreund},
  title        = {A note on the emptiness problem for alternating finite-memory automata},
  journal      = {Theor. Comput. Sci.},
  volume       = {526},
  pages        = {97--107},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.tcs.2014.01.020},
  doi          = {10.1016/J.TCS.2014.01.020},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tcs/GenkinKP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/GenkinPT14,
  author       = {Daniel Genkin and
                  Itamar Pipman and
                  Eran Tromer},
  editor       = {Lejla Batina and
                  Matthew Robshaw},
  title        = {Get Your Hands Off My Laptop: Physical Side-Channel Key-Extraction
                  Attacks on PCs},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2014 - 16th International
                  Workshop, Busan, South Korea, September 23-26, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8731},
  pages        = {242--260},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-44709-3\_14},
  doi          = {10.1007/978-3-662-44709-3\_14},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/GenkinPT14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/GenkinST14,
  author       = {Daniel Genkin and
                  Adi Shamir and
                  Eran Tromer},
  editor       = {Juan A. Garay and
                  Rosario Gennaro},
  title        = {{RSA} Key Extraction via Low-Bandwidth Acoustic Cryptanalysis},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2014 - 34th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8616},
  pages        = {444--461},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-44371-2\_25},
  doi          = {10.1007/978-3-662-44371-2\_25},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/GenkinST14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stoc/GenkinIPST14,
  author       = {Daniel Genkin and
                  Yuval Ishai and
                  Manoj Prabhakaran and
                  Amit Sahai and
                  Eran Tromer},
  editor       = {David B. Shmoys},
  title        = {Circuits resilient to additive attacks with applications to secure
                  computation},
  booktitle    = {Symposium on Theory of Computing, {STOC} 2014, New York, NY, USA,
                  May 31 - June 03, 2014},
  pages        = {495--504},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2591796.2591861},
  doi          = {10.1145/2591796.2591861},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/stoc/GenkinIPST14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GenkinPT14a,
  author       = {Daniel Genkin and
                  Itamar Pipman and
                  Eran Tromer},
  title        = {Get Your Hands Off My Laptop: Physical Side-Channel Key-Extraction
                  Attacks on PCs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {626},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/626},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GenkinPT14a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Ben-SassonCGTV13,
  author       = {Eli Ben{-}Sasson and
                  Alessandro Chiesa and
                  Daniel Genkin and
                  Eran Tromer and
                  Madars Virza},
  editor       = {Ran Canetti and
                  Juan A. Garay},
  title        = {SNARKs for {C:} Verifying Program Executions Succinctly and in Zero
                  Knowledge},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2013 - 33rd Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8043},
  pages        = {90--108},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40084-1\_6},
  doi          = {10.1007/978-3-642-40084-1\_6},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/Ben-SassonCGTV13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/innovations/Ben-SassonCGT13,
  author       = {Eli Ben{-}Sasson and
                  Alessandro Chiesa and
                  Daniel Genkin and
                  Eran Tromer},
  editor       = {Robert D. Kleinberg},
  title        = {Fast reductions from RAMs to delegatable succinct constraint satisfaction
                  problems: extended abstract},
  booktitle    = {Innovations in Theoretical Computer Science, {ITCS} '13, Berkeley,
                  CA, USA, January 9-12, 2013},
  pages        = {401--414},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2422436.2422481},
  doi          = {10.1145/2422436.2422481},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/innovations/Ben-SassonCGT13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stoc/Ben-SassonCGT13,
  author       = {Eli Ben{-}Sasson and
                  Alessandro Chiesa and
                  Daniel Genkin and
                  Eran Tromer},
  editor       = {Dan Boneh and
                  Tim Roughgarden and
                  Joan Feigenbaum},
  title        = {On the concrete efficiency of probabilistically-checkable proofs},
  booktitle    = {Symposium on Theory of Computing Conference, STOC'13, Palo Alto, CA,
                  USA, June 1-4, 2013},
  pages        = {585--594},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2488608.2488681},
  doi          = {10.1145/2488608.2488681},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/stoc/Ben-SassonCGT13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Ben-SassonCGTV13,
  author       = {Eli Ben{-}Sasson and
                  Alessandro Chiesa and
                  Daniel Genkin and
                  Eran Tromer and
                  Madars Virza},
  title        = {SNARKs for {C:} Verifying Program Executions Succinctly and in Zero
                  Knowledge},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {507},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/507},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Ben-SassonCGTV13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GenkinST13,
  author       = {Daniel Genkin and
                  Adi Shamir and
                  Eran Tromer},
  title        = {{RSA} Key Extraction via Low-Bandwidth Acoustic Cryptanalysis},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {857},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/857},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GenkinST13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eccc/Ben-SassonCGT12,
  author       = {Eli Ben{-}Sasson and
                  Alessandro Chiesa and
                  Daniel Genkin and
                  Eran Tromer},
  title        = {On the Concrete-Efficiency Threshold of Probabilistically-Checkable
                  Proofs},
  journal      = {Electron. Colloquium Comput. Complex.},
  volume       = {{TR12-045}},
  year         = {2012},
  url          = {https://eccc.weizmann.ac.il/report/2012/045},
  eprinttype    = {ECCC},
  eprint       = {TR12-045},
  timestamp    = {Tue, 27 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/eccc/Ben-SassonCGT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Ben-SassonCGT12,
  author       = {Eli Ben{-}Sasson and
                  Alessandro Chiesa and
                  Daniel Genkin and
                  Eran Tromer},
  title        = {Fast Reductions from RAMs to Delegatable Succinct Constraint Satisfaction
                  Problems},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {71},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/071},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Ben-SassonCGT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sLogica/AizikowitzFGK10,
  author       = {Tamar Aizikowitz and
                  Nissim Francez and
                  Daniel Genkin and
                  Michael Kaminski},
  title        = {Extending Free Pregroups with Lower Bounds},
  journal      = {Stud Logica},
  volume       = {95},
  number       = {3},
  pages        = {417--441},
  year         = {2010},
  url          = {https://doi.org/10.1007/s11225-010-9264-4},
  doi          = {10.1007/S11225-010-9264-4},
  timestamp    = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sLogica/AizikowitzFGK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/birthday/GenkinFK10,
  author       = {Daniel Genkin and
                  Nissim Francez and
                  Michael Kaminski},
  editor       = {Zohar Manna and
                  Doron A. Peled},
  title        = {Mildly Context-Sensitive Languages via Buffer Augmented Pregroup Grammars},
  booktitle    = {Time for Verification, Essays in Memory of Amir Pnueli},
  series       = {Lecture Notes in Computer Science},
  volume       = {6200},
  pages        = {144--166},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13754-9\_7},
  doi          = {10.1007/978-3-642-13754-9\_7},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/birthday/GenkinFK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics