Eran Tromer

12.4k total citations · 3 hit papers
49 papers, 4.4k citations indexed

About

Eran Tromer is a scholar working on Artificial Intelligence, Information Systems and Computer Networks and Communications. According to data from OpenAlex, Eran Tromer has authored 49 papers receiving a total of 4.4k indexed citations (citations by other indexed papers that have themselves been cited), including 42 papers in Artificial Intelligence, 13 papers in Information Systems and 10 papers in Computer Networks and Communications. Recurrent topics in Eran Tromer's work include Cryptography and Data Security (20 papers), Cryptographic Implementations and Security (12 papers) and Security and Verification in Computing (10 papers). Eran Tromer is often cited by papers focused on Cryptography and Data Security (20 papers), Cryptographic Implementations and Security (12 papers) and Security and Verification in Computing (10 papers). Eran Tromer collaborates with scholars based in Israel, United States and Switzerland. Eran Tromer's co-authors include Thomas Ristenpart, Stefan Savage, Hovav Shacham, Alessandro Chiesa, Madars Virza, Matthew Green, Vinod Vaikuntanathan, Adriana López-Alt, Christina Garman and Ian Miers and has published in prestigious journals such as SHILAP Revista de lepidopterología, Communications of the ACM and IEEE/ACM Transactions on Networking.

In The Last Decade

Eran Tromer

47 papers receiving 4.2k citations

Hit Papers

Hey, you, get off of my cloud 2009 2026 2014 2020 2009 2014 2012 400 800 1.2k

Peers

Eran Tromer
Nickolai Zeldovich United States
Bryan Ford United States
Aggelos Kiayias United States
Cédric Fournet United Kingdom
Michael Hicks United States
Zhendong Su United States
Nickolai Zeldovich United States
Eran Tromer
Citations per year, relative to Eran Tromer Eran Tromer (= 1×) peers Nickolai Zeldovich

Countries citing papers authored by Eran Tromer

Since Specialization
Citations

This map shows the geographic impact of Eran Tromer's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Eran Tromer with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Eran Tromer more than expected).

Fields of papers citing papers by Eran Tromer

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Eran Tromer. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Eran Tromer. The network helps show where Eran Tromer may publish in the future.

Co-authorship network of co-authors of Eran Tromer

This figure shows the co-authorship network connecting the top 25 collaborators of Eran Tromer. A scholar is included among the top collaborators of Eran Tromer based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Eran Tromer. Eran Tromer is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
Tromer, Eran, et al.. (2024). Group Oblivious Message Retrieval. OpenBU (Boston University). 4367–4385.
2.
Nassi, Ben, et al.. (2023). Optical Cryptanalysis: Recovering Cryptographic Keys from Power LED Light Fluctuations. 268–280. 4 indexed citations
3.
Schuster, Roei, Congzheng Song, Eran Tromer, & Vitaly Shmatikov. (2021). You Autocomplete Me: Poisoning Vulnerabilities in Neural Code Completion. arXiv (Cornell University). 1559–1575. 20 indexed citations
4.
Almashaqbeh, Ghada, et al.. (2021). Gage MPC: Bypassing Residual Function Leakage for Non-Interactive MPC. SHILAP Revista de lepidopterología. 6 indexed citations
5.
Genkin, Daniel, et al.. (2019). Synesthesia: Detecting Screen Content via Remote Acoustic Side Channels. arXiv (Cornell University). 853–869. 49 indexed citations
6.
Schuster, Roei, Vitaly Shmatikov, & Eran Tromer. (2018). Situational Access Control in the Internet of Things. 1056–1073. 53 indexed citations
7.
Schuster, Roei, Vitaly Shmatikov, & Eran Tromer. (2017). Beauty and the burst: remote identification of encrypted video streams. 1357–1374. 74 indexed citations
8.
Tromer, Eran, et al.. (2016). PhotoProof: Cryptographic Image Authentication for Any Set of Permissible Transformations. 255–271. 30 indexed citations
9.
Chiesa, Alessandro, Christina Garman, Matthew Green, et al.. (2014). Zerocash: Decentralized Anonymous Payments from Bitcoin. 459–474. 974 indexed citations breakdown →
10.
Tromer, Eran, et al.. (2013). Analyzing Unique-Bid Auction Sites for Fun and Profit.. Network and Distributed System Security Symposium.
11.
Bitansky, Nir, Ran Canetti, Alessandro Chiesa, & Eran Tromer. (2013). Recursive composition and bootstrapping for SNARKS and proof-carrying data. 111–120. 85 indexed citations
12.
Ben‐Sasson, Eli, Alessandro Chiesa, Daniel Genkin, & Eran Tromer. (2013). On the concrete efficiency of probabilistically-checkable proofs. 585–594. 21 indexed citations
13.
Ben‐Sasson, Eli, Alessandro Chiesa, Daniel Genkin, & Eran Tromer. (2012). On the Concrete-Efficiency Threshold of Probabilistically-Checkable Proofs. Electronic colloquium on computational complexity. 19. 45. 8 indexed citations
14.
Chiesa, Alessandro & Eran Tromer. (2010). Proof-Carrying Data and Hearsay Arguments from Signature Cards.. 310–331. 17 indexed citations
15.
Faust, Sebastian, Tal Rabin, Leonid Reyzin, Eran Tromer, & Vinod Vaikuntanathan. (2010). Protecting Circuits from Leakage: the Computationally-Bounded and Noisy Cases. Lirias (KU Leuven). 6110. 135–156. 11 indexed citations
16.
Faust, Sebastian, et al.. (2009). Protecting Circuits from Computationally Bounded and Noisy Leakage. IACR Cryptology ePrint Archive. 1 indexed citations
17.
Krohn, Maxwell & Eran Tromer. (2009). Noninterference for a Practical DIFC-Based Operating System. 4. 61–76. 36 indexed citations
18.
Geiselmann, Willi, et al.. (2005). Improved routing-based linear algebra for the number field sieve. 636–641 Vol. 1. 2 indexed citations
19.
Tromer, Eran. (2004). Acoustic cryptanalysis : on nosy people and noisy machines. 61 indexed citations
20.
Shamir, Adi & Eran Tromer. (2003). Factoring large numbers with the TWIRL device. Lecture notes in computer science. 2729. 1–26. 5 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026