Daniel Genkin
Daniel Genkin
Verified email at umich.edu - Homepage
Title
Cited by
Cited by
Year
Spectre attacks: Exploiting speculative execution
P Kocher, J Horn, A Fogh, D Genkin, D Gruss, W Haas, M Hamburg, ...
2019 IEEE Symposium on Security and Privacy (SP), 1-19, 2019
11592019
Meltdown: Reading Kernel Memory from User Space
M Lipp, M Schwarz, D Gruss, T Prescher, W Haas, A Fogh, J Horn, ...
27th USENIX Security Symposium (USENIX Security 18), 2018
1044*2018
Foreshadow: Extracting the Keys to the Intel SGX Kingdom with Transient Out-of-Order Execution
J Van Bulck, M Minkin, O Weisse, D Genkin, B Kasikci, F Piessens, ...
27th USENIX Security Symposium (USENIX Security 18), 2018
4922018
RSA key extraction via low-bandwidth acoustic cryptanalysis
D Genkin, A Shamir, E Tromer
Advances in Cryptology–CRYPTO 2014, 444-461, 2014
4502014
SNARKs for C: Verifying program executions succinctly and in zero knowledge
E Ben-Sasson, A Chiesa, D Genkin, E Tromer, M Virza
Annual Cryptology Conference, 90-108, 2013
4432013
CacheBleed: A timing attack on OpenSSL constant time RSA
Y Yarom, D Genkin, N Heninger
International Conference on Cryptographic Hardware and Embedded Systems, 346-367, 2016
1942016
Get Your Hands Off My Laptop: Physical Side-Channel Key-Extraction Attacks on PCs
D Genkin, I Pipman, E Tromer
Cryptographic Hardware and Embedded Systems–CHES 2014, 242-260, 2014
1612014
Stealing Keys from PCs using a Radio: Cheap Electromagnetic Attacks on Windowed Exponentiation
D Genkin, L Pachmanov, I Pipman, E Tromer
Cryptographic Hardware and Embedded Systems--CHES 2015: 17th International …, 2015
1442015
ECDSA key extraction from mobile devices via nonintrusive physical side channels
D Genkin, L Pachmanov, I Pipman, E Tromer, Y Yarom
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
1312016
Foreshadow-NG: Breaking the Virtual Memory Abstraction with Transient Out-of-Order Execution
O Weisse, J Van Bulck, M Minkin, D Genkin, B Kasikci, F Piessens, ...
Technical Report, 2018
1102018
Another flip in the wall of rowhammer defenses
D Gruss, M Lipp, M Schwarz, D Genkin, J Juffinger, S O'Connell, ...
2018 IEEE Symposium on Security and Privacy (SP), 245-261, 2018
932018
Physical key extraction attacks on PCs
D Genkin, L Pachmanov, I Pipman, A Shamir, E Tromer
Communications of the ACM 59 (6), 70-79, 2016
83*2016
Fallout: Leaking data on meltdown-resistant cpus
C Canella, D Genkin, L Giner, D Gruss, M Lipp, M Minkin, D Moghimi, ...
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019
80*2019
vSQL: Verifying Arbitrary SQL Queries over Dynamic Outsourced Databases
Y Zhang, D Genkin, J Katz, D Papadopoulos, C Papamanthou
Security and Privacy (SP), 2017 IEEE Symposium on, 863-880, 2017
802017
On the concrete efficiency of probabilistically-checkable proofs
E Ben-Sasson, A Chiesa, D Genkin, E Tromer
Proceedings of the forty-fifth annual ACM symposium on Theory of computing …, 2013
79*2013
Fast reductions from RAMs to delegatable succinct constraint satisfaction problems
E Ben-Sasson, A Chiesa, D Genkin, E Tromer
Proceedings of the 4th conference on Innovations in Theoretical Computer …, 2013
782013
ECDH key-extraction via low-bandwidth electromagnetic attacks on PCs
D Genkin, L Pachmanov, I Pipman, E Tromer
Cryptographers’ Track at the RSA Conference, 219-235, 2016
632016
Computational integrity with a public random string from quasi-linear PCPs
E Ben-Sasson, I Ben-Tov, A Chiesa, A Gabizon, D Genkin, M Hamilis, ...
EUROCRYPT, 2017
602017
Circuits resilient to additive attacks with applications to secure computation
D Genkin, Y Ishai, MM Prabhakaran, A Sahai, E Tromer
Proceedings of the 46th Annual ACM Symposium on Theory of Computing, 495-504, 2014
582014
Fast Large-Scale Honest-Majority MPC for Malicious Adversaries
K Chida, D Genkin, K Hamada, D Ikarashi, R Kikuchi, Y Lindell, A Nof
Annual International Cryptology Conference, 34-64, 2018
562018
The system can't perform the operation now. Try again later.
Articles 1–20