Follow
Hovav Shacham
Hovav Shacham
Professor of Computer Science, The University of Texas at Austin
Verified email at cs.utexas.edu - Homepage
Title
Cited by
Cited by
Year
Short signatures from the Weil pairing
D Boneh, B Lynn, H Shacham
International conference on the theory and application of cryptology and …, 2001
43132001
Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds
T Ristenpart, E Tromer, H Shacham, S Savage
Proceedings of the 16th ACM conference on Computer and communications …, 2009
29662009
Short group signatures
D Boneh, X Boyen, H Shacham
Annual international cryptology conference, 41-55, 2004
27502004
Aggregate and verifiably encrypted signatures from bilinear maps
D Boneh, C Gentry, B Lynn, H Shacham
Advances in Cryptology—EUROCRYPT 2003: International Conference on the …, 2003
26512003
Compact proofs of retrievability
H Shacham, B Waters
Journal of cryptology 26 (3), 442-483, 2013
25792013
Experimental security analysis of a modern automobile
K Koscher, A Czeskis, F Roesner, S Patel, T Kohno, S Checkoway, ...
2010 IEEE symposium on security and privacy, 447-462, 2010
24692010
Comprehensive experimental analyses of automotive attack surfaces
S Checkoway, D McCoy, B Kantor, D Anderson, H Shacham, S Savage, ...
20th USENIX security symposium (USENIX Security 11), 2011
21702011
The geometry of innocent flesh on the bone: Return-into-libc without function calls (on the x86)
H Shacham
Proceedings of the 14th ACM conference on Computer and communications …, 2007
20012007
Short signatures from the Weil pairing
D Boneh, B Lynn, H Shacham
Journal of cryptology 17, 297-319, 2004
17912004
On the effectiveness of address-space randomization
H Shacham, M Page, B Pfaff, EJ Goh, N Modadugu, D Boneh
Proceedings of the 11th ACM conference on Computer and communications …, 2004
13362004
Return-oriented programming without returns
S Checkoway, L Davi, A Dmitrienko, AR Sadeghi, H Shacham, ...
Proceedings of the 17th ACM conference on Computer and communications …, 2010
8222010
SiRiUS: Securing Remote Untrusted Storage.
EJ Goh, H Shacham, N Modadugu, D Boneh
NDSS 3, 131-145, 2003
8152003
Group signatures with verifier-local revocation
D Boneh, H Shacham
Proceedings of the 11th ACM conference on Computer and communications …, 2004
8052004
Return-oriented programming: Systems, languages, and applications
R Roemer, E Buchanan, H Shacham, S Savage
ACM Transactions on Information and System Security (TISSEC) 15 (1), 1-34, 2012
7432012
When good instructions go bad: Generalizing return-oriented programming to RISC
E Buchanan, R Roemer, H Shacham, S Savage
Proceedings of the 15th ACM conference on Computer and communications …, 2008
5682008
Pixel perfect: Fingerprinting canvas in HTML5
K Mowery, H Shacham
Proceedings of W2SP 2012, 2012
4982012
Sequential aggregate signatures and multisignatures without random oracles
S Lu, R Ostrovsky, A Sahai, H Shacham, B Waters
Advances in Cryptology-EUROCRYPT 2006: 24th Annual International Conference …, 2006
4542006
Sequential aggregate signatures from trapdoor permutations
A Lysyanskaya, S Micali, L Reyzin, H Shacham
Advances in Cryptology-EUROCRYPT 2004: International Conference on the …, 2004
4502004
Iago attacks: Why the system call API is a bad untrusted RPC interface
S Checkoway, H Shacham
ACM SIGARCH Computer Architecture News 41 (1), 253-264, 2013
3632013
Randomizable proofs and delegatable anonymous credentials
M Belenkiy, J Camenisch, M Chase, M Kohlweiss, A Lysyanskaya, ...
Advances in Cryptology-CRYPTO 2009: 29th Annual International Cryptology …, 2009
3632009
Fast variants of RSA
D Boneh, H Shacham
CryptoBytes 5 (1), 1-9, 2002
3052002
An empirical study of privacy-violating information flows in JavaScript web applications
D Jang, R Jhala, S Lerner, H Shacham
Proceedings of the 17th ACM conference on Computer and communications …, 2010
2772010
Fingerprinting information in JavaScript implementations
K Mowery, D Bogenreif, S Yilek, H Shacham
Proceedings of W2SP 2 (11), 2011
2422011
On subnormal floating point and abnormal timing
M Andrysco, D Kohlbrenner, K Mowery, R Jhala, S Lerner, H Shacham
2015 IEEE Symposium on Security and Privacy, 623-639, 2015
2252015
Eliminating fine grained timers in Xen
BC Vattikonda, S Das, H Shacham
Proceedings of the 3rd ACM workshop on Cloud computing security workshop, 41-46, 2011
2172011
When private keys are public: Results from the 2008 Debian OpenSSL vulnerability
S Yilek, E Rescorla, H Shacham, B Enright, S Savage
Proceedings of the 9th ACM SIGCOMM Conference on Internet Measurement, 15-27, 2009
2102009
Careful with composition: Limitations of the indifferentiability framework
T Ristenpart, H Shacham, T Shrimpton
Advances in Cryptology–EUROCRYPT 2011: 30th Annual International Conference …, 2011
1982011
Reconstructing RSA private keys from random key bits
N Heninger, H Shacham
Annual International Cryptology Conference, 1-17, 2009
1962009
Efficient ring signatures without random oracles
H Shacham, B Waters
Public Key Cryptography–PKC 2007: 10th International Conference on Practice …, 2007
1932007
On the practical exploitability of dual {EC} in {TLS} implementations
S Checkoway, R Niederhagen, A Everspaugh, M Green, T Lange, ...
23rd USENIX security symposium (USENIX security 14), 319-335, 2014
1902014
Hedged public-key encryption: How to protect against bad randomness
M Bellare, Z Brakerski, M Naor, T Ristenpart, G Segev, H Shacham, ...
Advances in Cryptology–ASIACRYPT 2009: 15th International Conference on the …, 2009
1762009
A cramer-shoup encryption scheme from the linear assumption and from progressively weaker linear variants
H Shacham
Cryptology ePrint Archive, 2007
1602007
Can DREs Provide Long-Lasting Security? The Case of Return-Oriented Programming and the AVC Advantage.
S Checkoway, AJ Feldman, B Kantor, JA Halderman, EW Felten, ...
EVT/WOTE 2009, 2009
1432009
A survey of two signature aggregation techniques
D Boneh, C Gentry, B Lynn, H Shacham
CryptoBytes 6 (2), 1-9, 2003
1312003
Do you know where your cloud files are?
K Benson, R Dowsley, H Shacham
Proceedings of the 3rd ACM workshop on Cloud computing security workshop, 73-82, 2011
1172011
A systematic analysis of the Juniper Dual EC incident
S Checkoway, J Maskiewicz, C Garman, J Fried, S Cohney, M Green, ...
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
1122016
Measuring the practical impact of {DNSSEC} deployment
W Lian, E Rescorla, H Shacham, S Savage
22nd USENIX Security Symposium (USENIX Security 13), 573-588, 2013
1122013
Forward-secure signatures with untrusted update
X Boyen, H Shacham, E Shen, B Waters
Proceedings of the 13th ACM conference on Computer and communications …, 2006
1092006
Improving SSL handshake performance via batching
H Shacham, D Boneh
Cryptographers’ track at the RSA Conference, 28-43, 2001
1082001
Trusted browsers for uncertain times
D Kohlbrenner, H Shacham
25th USENIX Security Symposium (USENIX Security 16), 463-480, 2016
972016
The system can't perform the operation now. Try again later.
Articles 1–40