Daniel Genkin
Daniel Genkin
Geverifieerd e-mailadres voor gatech.edu - Homepage
Titel
Geciteerd door
Geciteerd door
Jaar
Spectre attacks: Exploiting speculative execution
P Kocher, J Horn, A Fogh, D Genkin, D Gruss, W Haas, M Hamburg, ...
2019 IEEE Symposium on Security and Privacy (SP), 1-19, 2019
15772019
Meltdown: Reading Kernel Memory from User Space
M Lipp, M Schwarz, D Gruss, T Prescher, W Haas, A Fogh, J Horn, ...
27th USENIX Security Symposium (USENIX Security 18), 2018
1366*2018
Foreshadow: Extracting the Keys to the Intel SGX Kingdom with Transient Out-of-Order Execution
J Van Bulck, M Minkin, O Weisse, D Genkin, B Kasikci, F Piessens, ...
27th USENIX Security Symposium (USENIX Security 18), 2018
6762018
SNARKs for C: Verifying program executions succinctly and in zero knowledge
E Ben-Sasson, A Chiesa, D Genkin, E Tromer, M Virza
Annual Cryptology Conference, 90-108, 2013
5512013
RSA key extraction via low-bandwidth acoustic cryptanalysis
D Genkin, A Shamir, E Tromer
Advances in Cryptology–CRYPTO 2014, 444-461, 2014
4982014
CacheBleed: A timing attack on OpenSSL constant time RSA
Y Yarom, D Genkin, N Heninger
International Conference on Cryptographic Hardware and Embedded Systems, 346-367, 2016
2582016
Get Your Hands Off My Laptop: Physical Side-Channel Key-Extraction Attacks on PCs
D Genkin, I Pipman, E Tromer
Cryptographic Hardware and Embedded Systems–CHES 2014, 242-260, 2014
1892014
Stealing Keys from PCs using a Radio: Cheap Electromagnetic Attacks on Windowed Exponentiation
D Genkin, L Pachmanov, I Pipman, E Tromer
Cryptographic Hardware and Embedded Systems--CHES 2015: 17th International …, 2015
1752015
ECDSA key extraction from mobile devices via nonintrusive physical side channels
D Genkin, L Pachmanov, I Pipman, E Tromer, Y Yarom
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
1642016
Fallout: Leaking data on meltdown-resistant cpus
C Canella, D Genkin, L Giner, D Gruss, M Lipp, M Minkin, D Moghimi, ...
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019
148*2019
Foreshadow-NG: Breaking the Virtual Memory Abstraction with Transient Out-of-Order Execution
O Weisse, J Van Bulck, M Minkin, D Genkin, B Kasikci, F Piessens, ...
Technical Report, 2018
1442018
Another flip in the wall of rowhammer defenses
D Gruss, M Lipp, M Schwarz, D Genkin, J Juffinger, S O'Connell, ...
2018 IEEE Symposium on Security and Privacy (SP), 245-261, 2018
1192018
vSQL: Verifying Arbitrary SQL Queries over Dynamic Outsourced Databases
Y Zhang, D Genkin, J Katz, D Papadopoulos, C Papamanthou
Security and Privacy (SP), 2017 IEEE Symposium on, 863-880, 2017
1092017
Fast reductions from RAMs to delegatable succinct constraint satisfaction problems
E Ben-Sasson, A Chiesa, D Genkin, E Tromer
Proceedings of the 4th conference on Innovations in Theoretical Computer …, 2013
982013
Fast Large-Scale Honest-Majority MPC for Malicious Adversaries
K Chida, D Genkin, K Hamada, D Ikarashi, R Kikuchi, Y Lindell, A Nof
Annual International Cryptology Conference, 34-64, 2018
912018
LVI: Hijacking transient execution through microarchitectural load value injection
J Van Bulck, D Moghimi, M Schwarz, M Lippi, M Minkin, D Genkin, ...
2020 IEEE Symposium on Security and Privacy (SP), 54-72, 2020
892020
On the concrete efficiency of probabilistically-checkable proofs
E Ben-Sasson, A Chiesa, D Genkin, E Tromer
Proceedings of the forty-fifth annual ACM symposium on Theory of computing …, 2013
89*2013
ECDH key-extraction via low-bandwidth electromagnetic attacks on PCs
D Genkin, L Pachmanov, I Pipman, E Tromer
Cryptographers’ Track at the RSA Conference, 219-235, 2016
752016
Circuits resilient to additive attacks with applications to secure computation
D Genkin, Y Ishai, MM Prabhakaran, A Sahai, E Tromer
Proceedings of the 46th Annual ACM Symposium on Theory of Computing, 495-504, 2014
752014
Computational integrity with a public random string from quasi-linear PCPs
E Ben-Sasson, I Ben-Tov, A Chiesa, A Gabizon, D Genkin, M Hamilis, ...
EUROCRYPT, 2017
742017
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20