Eyal Ronen
Home
Publications
Talks
Projects
Contact
Eyal Ronen
Latest
TokenWeaver: Privacy Preserving and Post-Compromise Secure Attestation
Spec-o-Scope: Cache Probing at Cache Speed
The Ultimate Combo: Boosting Adversarial Example Transferability by Composing Data Augmentations
That’s not my Signature! Fail-Stop Signatures for a Post-Quantum World
Windows into the Past: Exploiting Legacy Crypto in Modern OS's Kerberos Implementation
SoK: SGX.Fail: How Secrets Get eXtracted
Multi-Stage Group Key Distribution and PAKEs: Securing Zoom Groups against Malicious Servers without New Security Elements
SDitH in the QROM
To attest or not to attest, this is the question – Provable attestation in FIDO2
Quantum Time/Memory/Data Tradeoff Attacks
Checking Passwords on Leaky Computers: A Side Channel Analysis of Chrome's Password Leak Detect Protocol
The Gates of Time: Improving Cache Attacks with Transient Execution
SPHINCS+C: Compressing SPHINCS+ With (Almost) No Cost
Efficient Detection of High Probability Statistical Properties of Cryptosystems via Surrogate Differentiation
CHIP and CRISP: Protecting All Parties Against Compromise through Identity-Binding PAKEs
Trust Dies in Darkness: Shedding Light on Samsung's TrustZone Keymaster Design
Spook.js: Attacking Chrome Strict Site Isolation via Speculative Execution
Practical (Post-Quantum) Key Combiners from One-Wayness and Applications to TLS
Error Resilient Space Partitioning
Three Third Generation Attacks on the Format Preserving Encryption Scheme FF3
Hashomer - A Proposal for a Privacy-Preserving Bluetooth Based Contact Tracing Scheme for Hamagen
Dragonblood: A Security Analysis of WPA3's SAE Handshake
Pseudorandom Black Swans: Cache Attacks on CTR_DRBG
The Retracing Boomerang Attack
How to (not) share a password: Privacy preserving protocols for finding heavy hitters with adversarial behavior
A Simple Explanation for the Existence of Adversarial Examples with Small Hamming Distance
The 9 Lives of Bleichenbacher's CAT: New Cache ATtacks on TLS Implementations
Pseudo Constant Time Implementations of TLS Are Only Pseudo Secure
Improved Key Recovery Attacks on Reduced-Round AES with Practical Data and Memory Complexities
Tight Bounds on Online Checkpointing Algorithms
IoT Goes Nuclear: Creating a Zigbee Chain Reaction
IoT Goes Nuclear: Creating a ZigBee Chain Reaction
Extended Functionality Attacks on IoT Devices: The Case of Smart Lights
Cite
×