Hovav Shacham
Person information
- affiliation: University of California, San Diego, USA
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
showing all ?? records
2010 – today
- 2017
- [c49]Wilson Lian, Hovav Shacham, Stefan Savage:
A Call to ARMs: Understanding the Costs and Benefits of JIT Spraying Mitigations. NDSS 2017 - [c48]David Kohlbrenner, Hovav Shacham:
On the effectiveness of mitigations against floating-point timing channels. USENIX Security Symposium 2017: 69-81 - [e6]Jonathan Katz, Hovav Shacham:
Advances in Cryptology - CRYPTO 2017 - 37th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017, Proceedings, Part I. Lecture Notes in Computer Science 10401, Springer 2017, ISBN 978-3-319-63687-0 [contents] - [e5]Jonathan Katz, Hovav Shacham:
Advances in Cryptology - CRYPTO 2017 - 37th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017, Proceedings, Part II. Lecture Notes in Computer Science 10402, Springer 2017, ISBN 978-3-319-63714-3 [contents] - [e4]Jonathan Katz, Hovav Shacham:
Advances in Cryptology - CRYPTO 2017 - 37th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017, Proceedings, Part III. Lecture Notes in Computer Science 10403, Springer 2017, ISBN 978-3-319-63696-2 [contents] - 2016
- [j6]Steven Hill, Zhimin Zhou, Lawrence Saul, Hovav Shacham:
On the (In)effectiveness of Mosaicing and Blurring as Tools for Document Redaction. PoPETs 2016(4): 403-417 (2016) - [c47]Ashish Venkat, Sriskanda Shamasunder, Hovav Shacham, Dean M. Tullsen:
HIPStR: Heterogeneous-ISA Program State Relocation. ASPLOS 2016: 727-741 - [c46]Stephen Checkoway, Jacob Maskiewicz, Christina Garman, Joshua Fried, Shaanan Cohney, Matthew Green, Nadia Heninger, Ralf-Philipp Weinmann, Eric Rescorla, Hovav Shacham:
A Systematic Analysis of the Juniper Dual EC Incident. ACM Conference on Computer and Communications Security 2016: 468-479 - [c45]David Kohlbrenner, Hovav Shacham:
Trusted Browsers for Uncertain Times. USENIX Security Symposium 2016: 463-480 - [i17]Stephen Checkoway, Shaanan Cohney, Christina Garman, Matthew Green, Nadia Heninger, Jacob Maskiewicz, Eric Rescorla, Hovav Shacham, Ralf-Philipp Weinmann:
A Systematic Analysis of the Juniper Dual EC Incident. IACR Cryptology ePrint Archive 2016: 376 (2016) - 2015
- [c44]Wilson Lian, Hovav Shacham, Stefan Savage:
Too LeJIT to Quit: Extending JIT Spraying to ARM. NDSS 2015 - [c43]Marc Andrysco, David Kohlbrenner, Keaton Mowery, Ranjit Jhala, Sorin Lerner, Hovav Shacham:
On Subnormal Floating Point and Abnormal Timing. IEEE Symposium on Security and Privacy 2015: 623-639 - 2014
- [c42]Theresa Calderon, Sarah Meiklejohn, Hovav Shacham, Brent Waters:
Rethinking Verifiably Encrypted Signatures: A Gap in Functionality and Potential Solutions. CT-RSA 2014: 349-366 - [c41]Stephen Checkoway, Ruben Niederhagen, Adam Everspaugh, Matthew Green, Tanja Lange, Thomas Ristenpart, Daniel J. Bernstein, Jake Maskiewicz, Hovav Shacham, Matthew Fredrikson:
On the Practical Exploitability of Dual EC in TLS Implementations. USENIX Security Symposium 2014: 319-335 - [c40]Keaton Mowery, Eric Wustrow, Tom Wypych, Corey Singleton, Chris Comfort, Eric Rescorla, J. Alex Halderman, Hovav Shacham, Stephen Checkoway:
Security Analysis of a Full-Body Scanner. USENIX Security Symposium 2014: 369-384 - [c39]Jacob Maskiewicz, Benjamin Ellis, James Mouradian, Hovav Shacham:
Mouse Trap: Exploiting Firmware Updates in USB Peripherals. WOOT 2014 - 2013
- [j5]Steve Lu, Rafail Ostrovsky, Amit Sahai, Hovav Shacham, Brent Waters:
Sequential Aggregate Signatures, Multisignatures, and Verifiably Encrypted Signatures Without Random Oracles. J. Cryptology 26(2): 340-373 (2013) - [j4]
- [c38]Stephen Checkoway, Hovav Shacham:
Iago attacks: why the system call API is a bad untrusted RPC interface. ASPLOS 2013: 253-264 - [c37]Karyn Benson, Hovav Shacham, Brent Waters:
The k-BDH Assumption Family: Bilinear Map Cryptography from Progressively Weaker Assumptions. CT-RSA 2013: 310-325 - [c36]Keaton Mowery, Michael Yung Chung Wei, David Kohlbrenner, Hovav Shacham, Steven Swanson:
Welcome to the Entropics: Boot-Time Entropy in Embedded Devices. IEEE Symposium on Security and Privacy 2013: 589-603 - [c35]Wilson Lian, Eric Rescorla, Hovav Shacham, Stefan Savage:
Measuring the Practical Impact of DNSSEC Deployment. USENIX Security Symposium 2013: 573-588 - [i16]Sarah Meiklejohn, Hovav Shacham:
New Trapdoor Projection Maps for Composite-Order Bilinear Groups. IACR Cryptology ePrint Archive 2013: 657 (2013) - 2012
- [j3]Ryan Roemer, Erik Buchanan, Hovav Shacham, Stefan Savage:
Return-Oriented Programming: Systems, Languages, and Applications. ACM Trans. Inf. Syst. Secur. 15(1): 2:1-2:34 (2012) - [c34]Keaton Mowery, Sriram Keelveedhi, Hovav Shacham:
Are AES x86 cache timing attacks still feasible? CCSW 2012: 19-24 - [i15]Mihir Bellare, Zvika Brakerski, Moni Naor, Thomas Ristenpart, Gil Segev, Hovav Shacham, Scott Yilek:
Hedged Public-key Encryption: How to Protect against Bad Randomness. IACR Cryptology ePrint Archive 2012: 220 (2012) - [i14]Karyn Benson, Hovav Shacham, Brent Waters:
The k-BDH Assumption Family: Bilinear Map Cryptography from Progressively Weaker Assumptions. IACR Cryptology ePrint Archive 2012: 687 (2012) - 2011
- [c33]Bhanu C. Vattikonda, Sambit Das, Hovav Shacham:
Eliminating fine grained timers in Xen. CCSW 2011: 41-46 - [c32]Karyn Benson, Rafael Dowsley, Hovav Shacham:
Do you know where your cloud files are? CCSW 2011: 73-82 - [c31]Thomas Ristenpart, Hovav Shacham, Thomas Shrimpton:
Careful with Composition: Limitations of the Indifferentiability Framework. EUROCRYPT 2011: 487-506 - [c30]Stephen Checkoway, Damon McCoy, Brian Kantor, Danny Anderson, Hovav Shacham, Stefan Savage, Karl Koscher, Alexei Czeskis, Franziska Roesner, Tadayoshi Kohno:
Comprehensive Experimental Analyses of Automotive Attack Surfaces. USENIX Security Symposium 2011 - [c29]Sarah Meiklejohn, Keaton Mowery, Stephen Checkoway, Hovav Shacham:
The Phantom Tollbooth: Privacy-Preserving Electronic Toll Collection in the Presence of Driver Collusion. USENIX Security Symposium 2011 - [e3]Hovav Shacham, Vanessa Teague:
2011 Electronic Voting Technology Workshop / Workshop on Trustworthy Elections, EVT/WOTE '11, San Francisco, CA, USA, August 8-9, 2011. USENIX Association 2011 [contents] - [i13]Thomas Ristenpart, Hovav Shacham, Thomas Shrimpton:
Careful with Composition: Limitations of Indifferentiability and Universal Composability. IACR Cryptology ePrint Archive 2011: 339 (2011) - 2010
- [c28]Sarah Meiklejohn, Hovav Shacham, David Mandell Freeman:
Limitations on Transformations from Composite-Order to Prime-Order Groups: The Case of Round-Optimal Blind Signatures. ASIACRYPT 2010: 519-538 - [c27]Dongseok Jang, Ranjit Jhala, Sorin Lerner, Hovav Shacham:
An empirical study of privacy-violating information flows in JavaScript web applications. ACM Conference on Computer and Communications Security 2010: 270-283 - [c26]Stephen Checkoway, Lucas Davi, Alexandra Dmitrienko, Ahmad-Reza Sadeghi, Hovav Shacham, Marcel Winandy:
Return-oriented programming without returns. ACM Conference on Computer and Communications Security 2010: 559-572 - [c25]Stephen Checkoway, Hovav Shacham, Eric Rescorla:
Are Text-Only Data Formats Safe? Or, Use This LaTeX Class File to Pwn Your Computer. LEET 2010 - [c24]Karl Koscher, Alexei Czeskis, Franziska Roesner, Shwetak Patel, Tadayoshi Kohno, Stephen Checkoway, Damon McCoy, Brian Kantor, Danny Anderson, Hovav Shacham, Stefan Savage:
Experimental Security Analysis of a Modern Automobile. IEEE Symposium on Security and Privacy 2010: 447-462 - [c23]Kai Wang, Eric Rescorla, Hovav Shacham, Serge J. Belongie:
OpenScan: A Fully Transparent Optical Scan Voting System. EVT/WOTE 2010 - [e2]Charlie Miller, Hovav Shacham:
4th USENIX Workshop on Offensive Technologies, WOOT '10, Washington, D.C., USA, August 9, 2010. USENIX Association 2010 [contents] - [i12]Sarah Meiklejohn, Hovav Shacham, David Mandell Freeman:
Limitations on Transformations from Composite-Order to Prime-Order Groups: The Case of Round-Optimal Blind Signatures. IACR Cryptology ePrint Archive 2010: 474 (2010)
2000 – 2009
- 2009
- [c22]Mihir Bellare, Zvika Brakerski, Moni Naor, Thomas Ristenpart, Gil Segev, Hovav Shacham, Scott Yilek:
Hedged Public-Key Encryption: How to Protect against Bad Randomness. ASIACRYPT 2009: 232-249 - [c21]Thomas Ristenpart, Eran Tromer, Hovav Shacham, Stefan Savage:
Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds. ACM Conference on Computer and Communications Security 2009: 199-212 - [c20]Nadia Heninger, Hovav Shacham:
Reconstructing RSA Private Keys from Random Key Bits. CRYPTO 2009: 1-17 - [c19]Mira Belenkiy, Jan Camenisch, Melissa Chase, Markulf Kohlweiss, Anna Lysyanskaya, Hovav Shacham:
Randomizable Proofs and Delegatable Anonymous Credentials. CRYPTO 2009: 108-125 - [c18]Scott Yilek, Eric Rescorla, Hovav Shacham, Brandon Enright, Stefan Savage:
When private keys are public: results from the 2008 Debian OpenSSL vulnerability. Internet Measurement Conference 2009: 15-27 - [c17]Stephen Checkoway, Ariel J. Feldman, Brian Kantor, J. Alex Halderman, Edward W. Felten, Hovav Shacham:
Can DREs Provide Long-Lasting Security? The Case of Return-Oriented Programming and the AVC Advantage. EVT/WOTE 2009 - [e1]Hovav Shacham, Brent Waters:
Pairing-Based Cryptography - Pairing 2009, Third International Conference, Palo Alto, CA, USA, August 12-14, 2009, Proceedings. Lecture Notes in Computer Science 5671, Springer 2009, ISBN 978-3-642-03297-4 [contents] - 2008
- [c16]
- [c15]Erik Buchanan, Ryan Roemer, Hovav Shacham, Stefan Savage:
When good instructions go bad: generalizing return-oriented programming to RISC. ACM Conference on Computer and Communications Security 2008: 27-38 - [c14]J. Alex Halderman, Eric Rescorla, Hovav Shacham, David A. Wagner:
You Go to Elections with the Voting System You Have: Stop-Gap Mitigations for Deployed Voting Systems. EVT 2008 - [i11]Hovav Shacham, Brent Waters:
Compact Proofs of Retrievability. IACR Cryptology ePrint Archive 2008: 73 (2008) - [i10]Mira Belenkiy, Jan Camenisch, Melissa Chase, Markulf Kohlweiss, Anna Lysyanskaya, Hovav Shacham:
Delegatable Anonymous Credentials. IACR Cryptology ePrint Archive 2008: 428 (2008) - [i9]Nadia Heninger, Hovav Shacham:
Reconstructing RSA Private Keys from Random Key Bits. IACR Cryptology ePrint Archive 2008: 510 (2008) - 2007
- [c13]Hovav Shacham:
The geometry of innocent flesh on the bone: return-into-libc without function calls (on the x86). ACM Conference on Computer and Communications Security 2007: 552-561 - [c12]Hovav Shacham, Brent Waters:
Efficient Ring Signatures Without Random Oracles. Public Key Cryptography 2007: 166-180 - [i8]Hovav Shacham:
A Cramer-Shoup Encryption Scheme from the Linear Assumption and from Progressively Weaker Linear Variants. IACR Cryptology ePrint Archive 2007: 74 (2007) - [i7]
- 2006
- [c11]Xavier Boyen, Hovav Shacham, Emily Shen, Brent Waters:
Forward-secure signatures with untrusted update. ACM Conference on Computer and Communications Security 2006: 191-200 - [c10]Steve Lu, Rafail Ostrovsky, Amit Sahai, Hovav Shacham, Brent Waters:
Sequential Aggregate Signatures and Multisignatures Without Random Oracles. EUROCRYPT 2006: 465-485 - [i6]Steve Lu, Rafail Ostrovsky, Amit Sahai, Hovav Shacham, Brent Waters:
Sequential Aggregate Signatures and Multisignatures without Random Oracles. IACR Cryptology ePrint Archive 2006: 96 (2006) - [i5]Hovav Shacham, Brent Waters:
Efficient Ring Signatures without Random Oracles. IACR Cryptology ePrint Archive 2006: 289 (2006) - [i4]Xavier Boyen, Hovav Shacham, Emily Shen, Brent Waters:
Forward-Secure Signatures with Untrusted Update. IACR Cryptology ePrint Archive 2006: 297 (2006) - 2004
- [j2]Dan Boneh, Ben Lynn, Hovav Shacham:
Short Signatures from the Weil Pairing. J. Cryptology 17(4): 297-319 (2004) - [j1]Hovav Shacham, Dan Boneh, Eric Rescorla:
Client-side caching for TLS. ACM Trans. Inf. Syst. Secur. 7(4): 553-575 (2004) - [c9]Dan Boneh, Hovav Shacham:
Group signatures with verifier-local revocation. ACM Conference on Computer and Communications Security 2004: 168-177 - [c8]Hovav Shacham, Matthew Page, Ben Pfaff, Eu-Jin Goh, Nagendra Modadugu, Dan Boneh:
On the effectiveness of address-space randomization. ACM Conference on Computer and Communications Security 2004: 298-307 - [c7]
- [c6]Anna Lysyanskaya, Silvio Micali, Leonid Reyzin, Hovav Shacham:
Sequential Aggregate Signatures from Trapdoor Permutations. EUROCRYPT 2004: 74-90 - [i3]Dan Boneh, Xavier Boyen, Hovav Shacham:
Short Group Signatures. IACR Cryptology ePrint Archive 2004: 174 (2004) - 2003
- [c5]Dan Boneh, Craig Gentry, Ben Lynn, Hovav Shacham:
Aggregate and Verifiably Encrypted Signatures from Bilinear Maps. EUROCRYPT 2003: 416-432 - [c4]Eu-Jin Goh, Hovav Shacham, Nagendra Modadugu, Dan Boneh:
SiRiUS: Securing Remote Untrusted Storage. NDSS 2003 - [i2]Anna Lysyanskaya, Silvio Micali, Leonid Reyzin, Hovav Shacham:
Sequential Aggregate Signatures from Trapdoor Permutations. IACR Cryptology ePrint Archive 2003: 91 (2003) - 2002
- [c3]
- [i1]Dan Boneh, Craig Gentry, Ben Lynn, Hovav Shacham:
Aggregate and Verifiably Encrypted Signatures from Bilinear Maps. IACR Cryptology ePrint Archive 2002: 175 (2002) - 2001
- [c2]
- [c1]
Coauthor Index
data released under the ODC-BY 1.0 license; see also our legal information page
last updated on 2018-01-17 20:57 CET by the dblp team