Short signatures from the Weil pairing D Boneh, B Lynn, H Shacham International conference on the theory and application of cryptology and …, 2001 | 4343 | 2001 |
Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds T Ristenpart, E Tromer, H Shacham, S Savage Proceedings of the 16th ACM conference on Computer and communications …, 2009 | 2985 | 2009 |
Short group signatures D Boneh, X Boyen, H Shacham Annual international cryptology conference, 41-55, 2004 | 2768 | 2004 |
Aggregate and verifiably encrypted signatures from bilinear maps D Boneh, C Gentry, B Lynn, H Shacham Advances in Cryptology—EUROCRYPT 2003: International Conference on the …, 2003 | 2681 | 2003 |
Compact proofs of retrievability H Shacham, B Waters Journal of cryptology 26 (3), 442-483, 2013 | 2600 | 2013 |
Experimental security analysis of a modern automobile K Koscher, A Czeskis, F Roesner, S Patel, T Kohno, S Checkoway, ... 2010 IEEE symposium on security and privacy, 447-462, 2010 | 2495 | 2010 |
Comprehensive experimental analyses of automotive attack surfaces S Checkoway, D McCoy, B Kantor, D Anderson, H Shacham, S Savage, ... 20th USENIX security symposium (USENIX Security 11), 2011 | 2201 | 2011 |
The geometry of innocent flesh on the bone: Return-into-libc without function calls (on the x86) H Shacham Proceedings of the 14th ACM conference on Computer and communications …, 2007 | 2015 | 2007 |
Short signatures from the Weil pairing D Boneh, B Lynn, H Shacham Journal of cryptology 17, 297-319, 2004 | 1811 | 2004 |
On the effectiveness of address-space randomization H Shacham, M Page, B Pfaff, EJ Goh, N Modadugu, D Boneh Proceedings of the 11th ACM conference on Computer and communications …, 2004 | 1344 | 2004 |
Return-oriented programming without returns S Checkoway, L Davi, A Dmitrienko, AR Sadeghi, H Shacham, ... Proceedings of the 17th ACM conference on Computer and communications …, 2010 | 828 | 2010 |
SiRiUS: Securing Remote Untrusted Storage. EJ Goh, H Shacham, N Modadugu, D Boneh NDSS 3, 131-145, 2003 | 815 | 2003 |
Group signatures with verifier-local revocation D Boneh, H Shacham Proceedings of the 11th ACM conference on Computer and communications …, 2004 | 806 | 2004 |
Return-oriented programming: Systems, languages, and applications R Roemer, E Buchanan, H Shacham, S Savage ACM Transactions on Information and System Security (TISSEC) 15 (1), 1-34, 2012 | 754 | 2012 |
When good instructions go bad: Generalizing return-oriented programming to RISC E Buchanan, R Roemer, H Shacham, S Savage Proceedings of the 15th ACM conference on Computer and communications …, 2008 | 570 | 2008 |
Pixel perfect: Fingerprinting canvas in HTML5 K Mowery, H Shacham Proceedings of W2SP 2012, 2012 | 500 | 2012 |
Sequential aggregate signatures and multisignatures without random oracles S Lu, R Ostrovsky, A Sahai, H Shacham, B Waters Advances in Cryptology-EUROCRYPT 2006: 24th Annual International Conference …, 2006 | 460 | 2006 |
Sequential aggregate signatures from trapdoor permutations A Lysyanskaya, S Micali, L Reyzin, H Shacham Advances in Cryptology-EUROCRYPT 2004: International Conference on the …, 2004 | 455 | 2004 |
Iago attacks: Why the system call API is a bad untrusted RPC interface S Checkoway, H Shacham ACM SIGARCH Computer Architecture News 41 (1), 253-264, 2013 | 373 | 2013 |
Randomizable proofs and delegatable anonymous credentials M Belenkiy, J Camenisch, M Chase, M Kohlweiss, A Lysyanskaya, ... Advances in Cryptology-CRYPTO 2009: 29th Annual International Cryptology …, 2009 | 367 | 2009 |