Eran Tromer

Last updated

Eran Tromer is a professor of computer science at Boston University. His research focuses on information security, cryptography and algorithms. [1] [2] He is a founding scientist of Zcash. [1] [3]

Contents

Biography

Tromer received his PhD from the Weizmann Institute of Science. [1] In 2024, he joined Boston University's Hariri Institute for Computing. [2]

Research

In 2014, Tromer and his colleagues demonstrated an RSA key extraction attack using acoustic cryptanalysis, a type of side-channel attack. [4] [3]

In 2014, Tromer coauthored the design of Zerocash, [5] which laid the foundation for the Zcash protocol. The work was recognized by the Test of Time Award at the IEEE Symposium on Security and Privacy. [6]

Awards

Related Research Articles

<span class="mw-page-title-main">Advanced Encryption Standard</span> Standard for the encryption of electronic data

The Advanced Encryption Standard (AES), also known by its original name Rijndael, is a specification for the encryption of electronic data established by the U.S. National Institute of Standards and Technology (NIST) in 2001.

<span class="mw-page-title-main">Adi Shamir</span> Israeli cryptographer (born 1952)

Adi Shamir is an Israeli cryptographer and inventor. He is a co-inventor of the Rivest–Shamir–Adleman (RSA) algorithm, a co-inventor of the Feige–Fiat–Shamir identification scheme, one of the inventors of differential cryptanalysis and has made numerous contributions to the fields of cryptography and computer science.

In cryptography, a zero-knowledge proof is a protocol in which one party can convince another party that some given statement is true, without conveying to the verifier any information beyond the mere fact of that statement's truth. The intuition underlying zero-knowledge proofs is that it is trivial to prove possession of the relevant information simply by revealing it; the hard part is to prove this possession without revealing this information.

In computer security, a side-channel attack is any attack based on extra information that can be gathered because of the fundamental way a computer protocol or algorithm is implemented, rather than flaws in the design of the protocol or algorithm itself or minor, but potentially devastating, mistakes or oversights in the implementation. Timing information, power consumption, electromagnetic leaks, and sound are examples of extra information which could be exploited to facilitate side-channel attacks.

Acoustic cryptanalysis is a type of side channel attack that exploits sounds emitted by computers or other devices.

<span class="mw-page-title-main">Dan Boneh</span> Israeli–American professor

Dan Boneh is an Israeli–American professor in applied cryptography and computer security at Stanford University.

Non-interactive zero-knowledge proofs are cryptographic primitives, where information between a prover and a verifier can be authenticated by the prover, without revealing any of the specific information beyond the validity of the statement itself. This makes direct communication between the prover and verifier unnecessary, effectively removing any intermediaries.

Virgil Dorin Gligor is a Romanian-American professor of electrical and computer engineering who specializes in the research of network security and applied cryptography.

<span class="mw-page-title-main">Crypto-1</span> Stream cipher

Crypto1 is a proprietary encryption algorithm and authentication protocol created by NXP Semiconductors for its MIFARE Classic RFID contactless smart cards launched in 1994. Such cards have been used in many notable systems, including Oyster card, CharlieCard and OV-chipkaart.

Computer security compromised by hardware failure is a branch of computer security applied to hardware. The objective of computer security includes protection of information and property from theft, corruption, or natural disaster, while allowing the information and property to remain accessible and productive to its intended users. Such secret information could be retrieved by different ways. This article focus on the retrieval of data thanks to misused hardware or hardware failure. Hardware could be misused or exploited to get secret data. This article collects main types of attack that can lead to data theft.

<span class="mw-page-title-main">Elie Bursztein</span> French computer scientist and hacker (born 1980)

Elie Bursztein, is a French computer scientist and software engineer. He is Google and DeepMind AI cybersecurity technical and research lead.

<span class="mw-page-title-main">Moti Yung</span> Israeli computer scientist

Mordechai M. "Moti" Yung is a cryptographer and computer scientist known for his work on cryptovirology and kleptography.

Zerocoin is a privacy protocol proposed in 2013 by Johns Hopkins University professor Matthew D. Green and his graduate students, Ian Miers and Christina Garman. It was designed as an extension to the Bitcoin protocol that would improve Bitcoin transactions' anonymity by having coin-mixing capabilities natively built into the protocol. Zerocoin is not currently compatible with Bitcoin.

<span class="mw-page-title-main">Matthew D. Green</span> American cryptographer and security technologist (born 1976)

Matthew Daniel Green is an American cryptographer and security technologist. Green is an Associate Professor of Computer Science at the Johns Hopkins Information Security Institute. He specializes in applied cryptography, privacy-enhanced information storage systems, anonymous cryptocurrencies, elliptic curve crypto-systems, and satellite television piracy. He is a member of the teams that developed the Zerocoin anonymous cryptocurrency and Zerocash. He has also been influential in the development of the Zcash system. He has been involved in the groups that exposed vulnerabilities in RSA BSAFE, Speedpass and E-ZPass. Green lives in Baltimore, MD with his wife, Melissa, 2 children and 2 miniature dachshunds.

Dmitry Khovratovich is a Russian cryptographer, currently a Lead Cryptographer for the Dusk Network, researcher for the Ethereum Foundation, and member of the International Association for Cryptologic Research.

Hovav Shacham is a professor in computer security at the University of Texas at Austin. He has made many advances to both cryptography and computer security.

<span class="mw-page-title-main">Çetin Kaya Koç</span>

Çetin Kaya Koç is a cryptographic engineer, author, and academic. His research interests include cryptographic engineering, finite field arithmetic, random number generators, homomorphic encryption, and machine learning.

Thomas Ristenpart is a professor of computer security at Cornell Tech.

Eli Ben-Sasson is an Israeli computer scientist known for his work on zero-knowledge proofs. He is also the co-founder and CEO of StarkWare Industries, and a former professor at Technion.

Alessandro Chiesa is an Italian computer scientist. He is an associate professor at École Polytechnique Fédérale de Lausanne (EPFL), and a now-adjunct professor at University of California, Berkeley. He has contributed to the field of zero-knowledge proofs, and was a co-founder of Zcash and StarkWare Industries.

References

  1. 1 2 3 "Eran Tromer". Boston University College of Arts and Sciences .
  2. 1 2 Wojtanik, Chloe. "Hariri Institute Welcomes New Faculty Affiliates Eran Tromer (CS) and Tianyu Wang (ENG)".
  3. 1 2 Peck, Morgen. "The Crazy Security Behind the Birth of Zcash, the Inside Story". IEEE Spectrum .
  4. Genkin, Daniel; Shamir, Adi; Tromer, Eran. RSA Key Extraction via Low-Bandwidth Acoustic Cryptanalysis. Advances in Cryptology – CRYPTO 2014.
  5. Ben-Sasson, Eli; Chiesa, Alessandro; Garman, Christina; Green, Matthew; Miers, Ian; Eran, Tromer; Virza, Madars. Zerocash: Decentralized Anonymous Payments from Bitcoin. 2014 IEEE Symposium on Security and Privacy.
  6. 1 2 "45th IEEE Symposium on Security and Privacy".
  7. "ACM CCS the Test-of-Time Awards".
  8. "Eran Tromer Honored with the Test of Time Award at the IEEE Symposium on Security and Privacy (S&P) 2024".