Global Information Lookup Global Information

Hovav Shacham information


Hovav Shacham
Alma materStanford University (PhD)
Scientific career
FieldsComputer Security
InstitutionsUniversity of Texas at Austin
Thesis New Paradigms in Signature Schemes  (2005)
Doctoral advisorDan Boneh

Hovav Shacham is a professor in computer security at the University of Texas at Austin. He has made many advances to both cryptography and computer security.

and 22 Related for: Hovav Shacham information

Request time (Page generated in 0.7762 seconds.)

Hovav Shacham

Last Update:

Hovav Shacham is a professor in computer security at the University of Texas at Austin. He has made many advances to both cryptography and computer security...

Word Count : 580

BLS digital signature

Last Update:

Shacham, Hovav. "New Paradigms in Signature Schemes" (PDF). www.semanticscholar.org. p. 18. Retrieved 2024-06-07. D. Boneh, C. Gentry, H. Shacham, and...

Word Count : 799

Canvas fingerprinting

Last Update:

when used to enhance other methods. In May 2012, Keaton Mowery and Hovav Shacham, researchers at University of California, San Diego, wrote a paper Pixel...

Word Count : 1249

Shaham

Last Update:

Israeli-born American violinist Hagai Shaham, Israeli-born American violinist Hovav Shacham, "S" in BLS digital signature Nathan Shaham, Israeli writer Ofir Shaham...

Word Count : 144

Device fingerprint

Last Update:

fingerprinting, which claims to add another 5.7 bits. In 2012, Keaton Mowery and Hovav Shacham, researchers at University of California, San Diego, showed how the...

Word Count : 3692

XDH assumption

Last Update:

E-print archive (2002/164), 2002. (pdf file) Dan Boneh, Xavier Boyen, Hovav Shacham. Short Group Signatures. CRYPTO 2004. (pdf file) Lucas Ballard, Matthew...

Word Count : 565

Computer security

Last Update:

2017. Stephen Checkoway; Damon McCoy; Brian Kantor; Danny Anderson; Hovav Shacham; Stefan Savage; Karl Koscher; Alexei Czeskis; Franziska Roesner; Tadayoshi...

Word Count : 22141

Subnormal number

Last Update:

Marc; Kohlbrenner, David; Mowery, Keaton; Jhala, Ranjit; Lerner, Sorin; Shacham, Hovav. "On Subnormal Floating Point and Abnormal Timing" (PDF). Retrieved...

Word Count : 1915

Decision Linear assumption

Last Update:

of non-interactive zero-knowledge proofs. Dan Boneh, Xavier Boyen, Hovav Shacham: Short Group Signatures. CRYPTO 2004: 41–55 John Bethencourt: Intro...

Word Count : 980

Hertzbleed

Last Update:

June 2022. Wang, Yingchen; Paccagnella, Riccardo; He, Elizabeth Tang; Shacham, Hovav; Fletcher, Christopher; Kohlbrenner, David (2022). "Hertzbleed: Turning...

Word Count : 507

Blind return oriented programming

Last Update:

Mashtizadeh, David Mazieres, Dan Boneh Return Oriented Programming, Hovav Shacham et al. http://www.scs.stanford.edu/brop/ http://www.scs.stanford.edu/brop/bittau-brop...

Word Count : 1123

Machine code

Last Update:

"Bill" Henry, Personal communication (NB. According to Jacob et al.) Shacham, Hovav (2007). The Geometry of Innocent Flesh on the Bone: Return-into-libc...

Word Count : 3402

History sniffing

Last Update:

Retrieved 16 November 2023. Jang, Dongseok; Jhala, Ranjit; Lerner, Sorin; Shacham, Hovav (4 October 2010). "An empirical study of privacy-violating information...

Word Count : 1969

Implementations of differentially private analyses

Last Update:

Marc; Kohlbrenner, David; Mowery, Keaton; Jhala, Ranjit; Lerner, Sorin; Shacham, Hovav (May 2015). "On Subnormal Floating Point and Abnormal Timing". 2015...

Word Count : 1342

Group signature

Last Update:

ISBN 978-3-540-67907-3. Retrieved 24 June 2012. Boneh, Dan; Boyen, Xavier; Shacham, Hovav (2004). "Short Group Signatures" (PDF). Advances in Cryptology – CRYPTO...

Word Count : 1057

Indistinguishability obfuscation

Last Update:

Machines: Constant Overhead and Amortization" (PDF). In Katz, Jonathan; Shacham, Hovav (eds.). Advances in Cryptology – CRYPTO 2017. Lecture Notes in Computer...

Word Count : 2086

Searchable symmetric encryption

Last Update:

Ohrimenko, Olya (2018). "Structured Encryption and Leakage Suppression". In Shacham, Hovav; Boldyreva, Alexandra (eds.). Advances in Cryptology – CRYPTO 2018....

Word Count : 2428

Key finding attacks

Last Update:

on encryption keys". In USENIX Security Symposium. Heninger, Nadia; Shacham, Hovav (2009-01-01). "Reconstructing rsa private keys from random key bits"...

Word Count : 1123

Miss Israel

Last Update:

1976 Levana Abarbanel Yif’at Netzer Nurit Amir 1977 Zehava Vardi Ya’el Hovav Ronit Makover Sara Hen 1978 Dorit Jellinek Sari Alon Lea Avgi Tammy (Tamar)...

Word Count : 929

Site isolation

Last Update:

Disselkoen, Craig; Garfinkel, Tal; Froyd, Nathan; Rahm, Eric; Lerner, Sorin; Shacham, Hovav; Stefan, Deian (2020). Retrofitting Fine Grain Isolation in the Firefox...

Word Count : 2209

Homomorphic signatures for network coding

Last Update:

journal}}: Cite journal requires |journal= (help) Boneh, Dan; Lynn, Ben; Shacham, Hovav (2001). "Short Signatures from the Weil Pairing" (PDF). Advances in...

Word Count : 3297

Aggelos Kiayias

Last Update:

Provably Secure Proof-of-Stake Blockchain Protocol". In Katz, Jonathan; Shacham, Hovav (eds.). Advances in Cryptology – CRYPTO 2017. Lecture Notes in Computer...

Word Count : 2049

PDF Search Engine © AllGlobal.net