Department of Computer Science and Engineering
University of California, San Diego
|Office:||EBU 3B 3124|
|Address:||UCSD Dept. of CSE
9500 Gilman Drive, MC 0404
La Jolla, CA 92093-0404
On this page:
I am a member of the editorial board of the USENIX Journal of Election Technology and Systems (JETS).
In January, 2014, I signed an open letter from US researchers in cryptography and information security: masssurveillance.info.
Recent publications include:
S. Checkoway, M. Fredrikson, R. Niederhagen, A. Everspaugh, M. Green, T. Lange, T. Ristenpart, D.J. Bernstein, J. Maskiewicz, and H. Shacham. “On the Practical Exploitability of Dual EC in TLS Implementations.” In K. Fu, ed., Proceedings of USENIX Security 2014. USENIX, Aug. 2014. To appear.
K. Mowery, E. Wustrow, T. Wypych, C. Singleton, C. Comfort, E. Rescorla, S. Checkoway, J.A. Halderman, and H. Shacham. “Security Analysis of a Full-Body Scanner.” In K. Fu, ed., Proceedings of USENIX Security 2014. USENIX, Aug. 2014. To appear.
T. Calderon, S. Meiklejohn, H. Shacham, and B. Waters. “Rethinking Verifiably Encrypted Signatures: A Gap in Functionality and Potential Solutions.” In J. Benaloh, ed., Proceedings of CT-RSA 2014, vol. 8366 of LNCS, pages 349–66. Springer-Verlag, Feb. 2014. (Details; PDF)
S. Meiklejohn and H. Shacham.
“New Trapdoor Projection
Maps for Composite-
W. Lian, E. Rescorla, H. Shacham, and S. Savage. “Measuring the Practical Impact of DNSSEC Deployment.” In S. King, ed., Proceedings of USENIX Security 2013. USENIX, Aug. 2013. (Details; PDF)
H. Shacham and B. Waters. “Compact Proofs of Retrievability.” J. Cryptology 26(3):442–83, Jul. 2013. (Details; PDF)
K. Mowery, M. Wei, D. Kohlbrenner, H. Shacham, and S. Swanson. “Welcome to the Entropics: Boot-Time Entropy in Embedded Devices.” In W. Lee, A. Perrig, and M. Backes, eds., Proceedings of IEEE Security and Privacy (“Oakland”) 2013, pages 589–603. IEEE Computer Society, May 2013. (Details; PDF)
B. Adida, C. Anderson, A.I. Anton, M. Blaze, R. Dingledine, E.W. Felten, M.D. Green, J.A. Halderman, D.R. Jefferson, C. Jennings, S. Landau, N. Mitter, P.G. Neumann, E. Rescorla, F.B. Schneider, B. Schneier, H. Shacham, M. Sherr, D. Wagner, and P. Zimmermann. “CALEA II: Risks of Wiretap Modifications to Endpoints.” May 2013. Report, coordinated by the Center for Democracy & Technology. (PDF)
All my publications are available online.
Hovav Shacham joined UC San Diego’s Department of Computer Science and Engineering in Fall 2007.
Shacham received his Ph.D. in computer science in 2005 from Stanford University, where he had also earned, in 2000, an A.B. in English. His Ph.D. advisor was Dan Boneh. In 2006 and 2007, he was a Koshland Scholars Program postdoctoral fellow at the Weizmann Institute of Science, hosted by Moni Naor.
Shacham’s research interests are in applied cryptography, systems security, privacy-enhancing technologies, and tech policy.
In 2007, Shacham participated in California Secretary of State Debra Bowen’s “Top-to-Bottom” review of the voting machines certified for use in California. He was a member of the team reviewing Hart InterCivic source code; the report he co-authored was cited by the Secretary in her decision to withdraw approval from Hart voting machines.
Photo copyright 2010 by Nick Vossbrink. All rights reserved.
Portrait copyright 2011 by Natalie Bessell. All rights reserved.
BSD Daemon Copyright 1988 by Marshall Kirk McKusick.
All Rights Reserved.
Permission to use the daemon may be obtained from:
or via email at