Hovav Shacham
Orcid: 0009-0008-0225-8714Affiliations:
- University of Texas at Austin, USA
- University of California, San Diego, USA (former)
According to our database1,
Hovav Shacham
authored at least 79 papers
between 2001 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
On csauthors.net:
Bibliography
2024
Proceedings of the 33rd USENIX Security Symposium, 2024
GPU.zip: On the Side-Channel Implications of Hardware-Based Graphical Data Compression.
Proceedings of the IEEE Symposium on Security and Privacy, 2024
Proceedings of the ACM SIGOPS 30th Symposium on Operating Systems Principles, 2024
2023
IEEE Micro, 2023
Constant-Time Wasmtime, for Real This Time: End-to-End Verified Zero-Overhead Constant-Time Programming for the Web and Beyond.
CoRR, 2023
The Most Dangerous Codec in the World: Finding and Exploiting Vulnerabilities in H.264 Decoders.
Proceedings of the 32nd USENIX Security Symposium, 2023
Checking Passwords on Leaky Computers: A Side Channel Analysis of Chrome's Password Leak Detect Protocol.
Proceedings of the 32nd USENIX Security Symposium, 2023
DVFS Frequently Leaks Secrets: Hertzbleed Attacks Beyond SIKE, Cryptography, and CPU-Only Data.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023
2021
Proceedings of the 30th USENIX Security Symposium, 2021
2020
login Usenix Mag., 2020
Proc. ACM Program. Lang., 2020
CoRR, 2020
Proceedings of the 29th USENIX Security Symposium, 2020
Proceedings of the 41st ACM SIGPLAN International Conference on Programming Language Design and Implementation, 2020
2019
2018
Commun. ACM, 2018
Short Unique Signatures from RSA with a Tight Security Reduction (in the Random Oracle Model).
Proceedings of the Financial Cryptography and Data Security, 2018
2017
Proceedings of the 26th USENIX Security Symposium, 2017
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017
2016
Proc. Priv. Enhancing Technol., 2016
IACR Cryptol. ePrint Arch., 2016
Proceedings of the 25th USENIX Security Symposium, 2016
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016
Proceedings of the Twenty-First International Conference on Architectural Support for Programming Languages and Operating Systems, 2016
2015
Proceedings of the 2015 IEEE Symposium on Security and Privacy, 2015
Proceedings of the 22nd Annual Network and Distributed System Security Symposium, 2015
2014
Proceedings of the 8th USENIX Workshop on Offensive Technologies, 2014
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014
Rethinking Verifiably Encrypted Signatures: A Gap in Functionality and Potential Solutions.
Proceedings of the Topics in Cryptology - CT-RSA 2014, 2014
2013
Sequential Aggregate Signatures, Multisignatures, and Verifiably Encrypted Signatures Without Random Oracles.
J. Cryptol., 2013
IACR Cryptol. ePrint Arch., 2013
Proceedings of the 22th USENIX Security Symposium, Washington, DC, USA, August 14-16, 2013, 2013
Proceedings of the 2013 IEEE Symposium on Security and Privacy, 2013
Proceedings of the Architectural Support for Programming Languages and Operating Systems, 2013
2012
ACM Trans. Inf. Syst. Secur., 2012
The k-BDH Assumption Family: Bilinear Map Cryptography from Progressively Weaker Assumptions.
IACR Cryptol. ePrint Arch., 2012
IACR Cryptol. ePrint Arch., 2012
Proceedings of the 2012 ACM Workshop on Cloud computing security, 2012
2011
Careful with Composition: Limitations of Indifferentiability and Universal Composability.
IACR Cryptol. ePrint Arch., 2011
The Phantom Tollbooth: Privacy-Preserving Electronic Toll Collection in the Presence of Driver Collusion.
Proceedings of the 20th USENIX Security Symposium, 2011
Proceedings of the 20th USENIX Security Symposium, 2011
Proceedings of the Advances in Cryptology - EUROCRYPT 2011, 2011
Proceedings of the 3rd ACM Cloud Computing Security Workshop, 2011
Proceedings of the 3rd ACM Cloud Computing Security Workshop, 2011
2010
Limitations on Transformations from Composite-Order to Prime-Order Groups: The Case of Round-Optimal Blind Signatures.
IACR Cryptol. ePrint Arch., 2010
Proceedings of the 2010 Electronic Voting Technology Workshop / Workshop on Trustworthy Elections, 2010
Proceedings of the 31st IEEE Symposium on Security and Privacy, 2010
Proceedings of the 3rd USENIX Workshop on Large-Scale Exploits and Emergent Threats, 2010
An empirical study of privacy-violating information flows in JavaScript web applications.
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010
2009
Can DREs Provide Long-Lasting Security? The Case of Return-Oriented Programming and the AVC Advantage.
Proceedings of the 2009 Electronic Voting Technology Workshop / Workshop on Trustworthy Elections, 2009
Proceedings of the 9th ACM SIGCOMM Internet Measurement Conference, IMC 2009, Chicago, 2009
Proceedings of the Advances in Cryptology, 2009
Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds.
Proceedings of the 2009 ACM Conference on Computer and Communications Security, 2009
2008
IACR Cryptol. ePrint Arch., 2008
You Go to Elections with the Voting System You Have: Stop-Gap Mitigations for Deployed Voting Systems.
Proceedings of the 2008 USENIX/ACCURATE Electronic Voting Workshop, 2008
Proceedings of the 2008 ACM Conference on Computer and Communications Security, 2008
2007
A Cramer-Shoup Encryption Scheme from the Linear Assumption and from Progressively Weaker Linear Variants.
IACR Cryptol. ePrint Arch., 2007
The geometry of innocent flesh on the bone: return-into-libc without function calls (on the x86).
Proceedings of the 2007 ACM Conference on Computer and Communications Security, 2007
2006
IACR Cryptol. ePrint Arch., 2006
2004
Proceedings of the 11th ACM Conference on Computer and Communications Security, 2004
Proceedings of the 11th ACM Conference on Computer and Communications Security, 2004
2003
IACR Cryptol. ePrint Arch., 2003
Proceedings of the Network and Distributed System Security Symposium, 2003
2002
IACR Cryptol. ePrint Arch., 2002
Proceedings of the Network and Distributed System Security Symposium, 2002
2001
Proceedings of the Topics in Cryptology, 2001