What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Amir Herzberg
Google Scholar
ORCID:
0000-0001-5586-5261
64
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/ndss
Securing BGP ASAP: ASPA and other Post-ROV Defenses.
Justin Furuness
Cameron Morris
Reynaldo Morillo
Arvind Kasiliya
Bing Wang
Amir Herzberg
2024
conf/ccs
Provable Security for PKI Schemes.
Sara Wrótniak
Hemi Leibowitz
Ewa Syta
Amir Herzberg
2024
conf/ndss
BGP-iSec: Improved Security of Internet Routing Against Post-ROV Attacks.
Cameron Morris
Amir Herzberg
Bing Wang
Samuel Secondo
2023
conf/uss
BGPy: The BGP Python Security Simulator.
Justin Furuness
Cameron Morris
Reynaldo Morillo
Amir Herzberg
Bing Wang
2022
conf/ccs
Automatic Detection of Fake Key Attacks in Secure Messaging.
Tarun Kumar Yadav
Devashish Gosain
Amir Herzberg
Daniel Zappala
Kent E. Seamons
2021
conf/crypto
MoSS: Modular Security Specifications Framework.
Amir Herzberg
Hemi Leibowitz
Ewa Syta
Sara Wrótniak
2021
conf/ndss
ROV++: Improved Deployable Defense against BGP Hijacking.
Reynaldo Morillo
Justin Furuness
Cameron Morris
James Breslin
Amir Herzberg
Bing Wang
2020
conf/ndss
DISCO: Sidestepping RPKI's Deployment Barriers.
Tomas Hlavacek
Ítalo Cunha
Yossi Gilad
Amir Herzberg
Ethan Katz-Bassett
Michael Schapira
Haya Schulmann
2020
conf/cans
Cross-Site Search Attacks: Unauthorized Queries over Private Data.
Bar Meyuhas
Nethanel Gelernter
Amir Herzberg
2019
conf/ccs
The Leaky Actuator: A Provably-covert Channel in Cyber Physical Systems.
Amir Herzberg
Yehonatan Kfir
2019
conf/uss
No Right to Remain Silent: Isolating Malicious Mixes.
Hemi Leibowitz
Ania M. Piotrowska
George Danezis
Amir Herzberg
2019
conf/pkc
Efficient Non-Interactive Zero-Knowledge Proofs in Cross-Domains Without Trusted Setup.
Michael Backes
Lucjan Hanzlik
Amir Herzberg
Aniket Kate
Ivan Pryvalov
2019
conf/acsac
The chatty-sensor: a provably-covert channel in cyber physical systems.
Amir Herzberg
Yehonatan Kfir
2018
conf/dsn
Practical Experience: Methodologies for Measuring Route Origin Validation.
Tomas Hlavacek
Amir Herzberg
Haya Schulmann
Michael Waidner
2018
conf/cans
DNS-DNS: DNS-Based De-NAT Scheme.
Liran Orevi
Amir Herzberg
Haim Zlatokrilov
2017
conf/ndss
Are We There Yet? On RPKI's Deployment and Security.
Yossi Gilad
Avichai Cohen
Amir Herzberg
Michael Schapira
Haya Schulmann
2017
conf/cans
Two Cents for Strong Anonymity: The Anonymous Post-office Protocol.
Nethanel Gelernter
Amir Herzberg
Hemi Leibowitz
2016
conf/ccs
Exposing Transmitters in Mobile Multi-Agent Games.
Mai Ben-Adar Bessos
Simon Birnbach
Amir Herzberg
Ivan Martinovic
2016
conf/ccs
Stratum Filtering: Cloud-based Detection of Attack Sources.
Amir Herzberg
Haya Schulmann
Michael Waidner
2016
conf/crypto
Obfuscation Combiners.
Marc Fischlin
Amir Herzberg
Hod Bin Noon
Haya Schulmann
2016
conf/esorics
Autocomplete Injection Attack.
Nethanel Gelernter
Amir Herzberg
2016
conf/esorics
Anonymous RAM.
Michael Backes
Amir Herzberg
Aniket Kate
Ivan Pryvalov
2016
conf/ndss
CDN-on-Demand: An affordable DDoS Defense via Untrusted Clouds.
Yossi Gilad
Amir Herzberg
Michael Sudkovitch
Michael Goberman
2015
conf/ccs
Cross-Site Search Attacks.
Nethanel Gelernter
Amir Herzberg
2015
conf/acsac
Cross-Site Framing Attacks.
Nethanel Gelernter
Yoel Grinstein
Amir Herzberg
2014
conf/ccs
RAID-PIR: Practical Multi-Server PIR.
Daniel Demmler
Amir Herzberg
Thomas Schneider
2014
conf/acsac
DNS authentication as a service: preventing amplification attacks.
Amir Herzberg
Haya Schulmann
2014
conf/acsac
Less is more: cipher-suite negotiation for DNSSEC.
Amir Herzberg
Haya Schulmann
Bruno Crispo
2014
conf/cans
Negotiating DNSSEC Algorithms over Legacy Proxies.
Amir Herzberg
Haya Schulmann
2013
journals/compsec
TCP Ack storm DoS attacks.
Raz Abramov
Amir Herzberg
2013
journals/istr
Oblivious and fair server-aided two-party computation.
Amir Herzberg
Haya Schulmann
2013
conf/ccs
Cloudoscopy: services discovery and topology mapping.
Amir Herzberg
Haya Schulmann
Johanna Ullrich
Edgar R. Weippl
2013
conf/esorics
Vulnerable Delegation of DNS Resolution.
Amir Herzberg
Haya Schulmann
2013
conf/esorics
Plug-and-Play IP Security - Anonymity Infrastructure instead of PKI.
Yossi Gilad
Amir Herzberg
2013
conf/cns
Fragmentation Considered Poisonous, or: One-domain-to-rule-them-all.org.
Amir Herzberg
Haya Schulmann
2013
conf/cns
Provenance of exposure: Identifying sources of leaked documents.
Christian S. Collberg
Aaron Gibson
Sam Martin
Nitin Shinde
Amir Herzberg
Haya Schulmann
2013
conf/cns
DNSSEC: Security and availability challenges.
Amir Herzberg
Haya Schulmann
2013
conf/acsac
Socket overloading for fun and cache-poisoning.
Amir Herzberg
Haya Schulmann
2012
conf/sec
My Authentication Album: Adaptive Images-Based Login Mechanism.
Amir Herzberg
Ronen Margulies
2012
conf/esorics
Security of Patched DNS.
Amir Herzberg
Haya Schulmann
2011
conf/uss
Fragmentation Considered Vulnerable: Blindly Intercepting and Discarding Fragments.
Yossi Gilad
Amir Herzberg
2011
conf/sec
TCP Ack Storm DoS Attacks.
Raz Abramov
Amir Herzberg
2011
conf/esorics
Forcing Johnny to Login Safely - Long-Term User Study of Forcing and Training Login Mechanisms.
Amir Herzberg
Ronen Margulies
2010
conf/ndss
Stealth DoS Attacks on Secure Channels.
Amir Herzberg
Haya Schulmann
2009
journals/compsec
Why Johnny can't surf (safely)? Attacks and defenses for web users.
Amir Herzberg
2009
journals/compsec
DNS-based email sender authentication mechanisms: A critical review.
Amir Herzberg
2009
conf/sec
Combining Authentication, Reputation and Classification to Make Phishing Unprofitable.
Amir Herzberg
2009
conf/sec
Towards a Theory of White-Box Security.
Amir Herzberg
Haya Schulmann
Amitabh Saxena
Bruno Crispo
2009
conf/esorics
Lightweight Opportunistic Tunneling (LOT).
Yossi Gilad
Amir Herzberg
2008
conf/tcc
The Layered Games Framework for Specifications and Analysis of Security Protocols.
Amir Herzberg
Igal Yoffe
2005
conf/ctrsa
On Tolerant Cryptographic Constructions.
Amir Herzberg
2001
conf/ctrsa
Relying Party Credentials Framework.
Amir Herzberg
Yosi Mass
2000
journals/joc
Maintaining Authenticated Communication in the Presence of Break-Ins.
Ran Canetti
Shai Halevi
Amir Herzberg
2000
conf/sp
Access Control Meets Public Key Infrastructure, Or: Assigning Roles to Strangers.
Amir Herzberg
Yosi Mass
Joris Mihaeli
Dalit Naor
Yiftach Ravid
1999
conf/ccs
The Proactive Security Toolkit and Applications.
Boaz Barak
Amir Herzberg
Dalit Naor
Eldad Shai
1997
conf/ccs
Proactive Public Key and Signature Systems.
Amir Herzberg
Markus Jakobsson
Stanislaw Jarecki
Hugo Krawczyk
Moti Yung
1995
conf/uss
Network Randomization Protocol: A Proactive Pseudo-Random Generator.
Chee-Seng Chow
Amir Herzberg
1995
conf/uss
Design and Implementation of Modular Key Management Protocol and IP Secure Tunnel on AIX.
Pau-Chen Cheng
Juan A. Garay
Amir Herzberg
Hugo Krawczyk
1995
conf/crypto
Proactive Secret Sharing Or: How to Cope With Perpetual Leakage.
Amir Herzberg
Stanislaw Jarecki
Hugo Krawczyk
Moti Yung
1994
conf/crypto
Maintaining Security in the Presence of Transient Faults.
Ran Canetti
Amir Herzberg
1992
conf/crypto
Pubic Randomness in Cryptography.
Amir Herzberg
Michael Luby
1992
conf/crypto
Perfectly-Secure Key Distribution for Dynamic Conferences.
Carlo Blundo
Alfredo De Santis
Amir Herzberg
Shay Kutten
Ugo Vaccaro
Moti Yung
1991
conf/crypto
Systematic Design of Two-Party Authentication Protocols.
Ray Bird
Inder S. Gopal
Amir Herzberg
Philippe A. Janson
Shay Kutten
Refik Molva
Moti Yung
1985
conf/crypto
Public Protection of Software.
Amir Herzberg
Shlomit S. Pinter
Coauthors
Aaron Gibson
(1)
Alfredo De Santis
(1)
Amir Herzberg
(64)
Amitabh Saxena
(1)
Ania M. Piotrowska
(1)
Aniket Kate
(2)
Arvind Kasiliya
(1)
Avichai Cohen
(1)
Bar Meyuhas
(1)
Bing Wang
(4)
Boaz Barak
(1)
Bruno Crispo
(2)
Cameron Morris
(4)
Carlo Blundo
(1)
Chee-Seng Chow
(1)
Christian S. Collberg
(1)
Dalit Naor
(2)
Daniel Demmler
(1)
Daniel Zappala
(1)
Devashish Gosain
(1)
Edgar R. Weippl
(1)
Eldad Shai
(1)
Ethan Katz-Bassett
(1)
Ewa Syta
(2)
George Danezis
(1)
Haim Zlatokrilov
(1)
Haya Schulmann
(18)
Hemi Leibowitz
(4)
Hod Bin Noon
(1)
Hugo Krawczyk
(3)
Igal Yoffe
(1)
Inder S. Gopal
(1)
Ítalo Cunha
(1)
Ivan Martinovic
(1)
Ivan Pryvalov
(2)
James Breslin
(1)
Johanna Ullrich
(1)
Joris Mihaeli
(1)
Juan A. Garay
(1)
Justin Furuness
(3)
Kent E. Seamons
(1)
Liran Orevi
(1)
Lucjan Hanzlik
(1)
Mai Ben-Adar Bessos
(1)
Marc Fischlin
(1)
Markus Jakobsson
(1)
Michael Backes
(2)
Michael Goberman
(1)
Michael Luby
(1)
Michael Schapira
(2)
Michael Sudkovitch
(1)
Michael Waidner
(2)
Moti Yung
(4)
Nethanel Gelernter
(5)
Nitin Shinde
(1)
Pau-Chen Cheng
(1)
Philippe A. Janson
(1)
Ran Canetti
(2)
Ray Bird
(1)
Raz Abramov
(2)
Refik Molva
(1)
Reynaldo Morillo
(3)
Ronen Margulies
(2)
Sam Martin
(1)
Samuel Secondo
(1)
Sara Wrótniak
(2)
Shai Halevi
(1)
Shay Kutten
(2)
Shlomit S. Pinter
(1)
Simon Birnbach
(1)
Stanislaw Jarecki
(2)
Tarun Kumar Yadav
(1)
Thomas Schneider
(1)
Tomas Hlavacek
(2)
Ugo Vaccaro
(1)
Yehonatan Kfir
(2)
Yiftach Ravid
(1)
Yoel Grinstein
(1)
Yosi Mass
(2)
Yossi Gilad
(6)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to