Alexander Hoover (ahoover)

Alexander Hoover

Assistant Professor

Charles V. Schaefer, Jr. School of Engineering and Science

Department of Computer Science

Education

  • PhD (2024) University of Chicago (Computer Science (Cryptography))
  • MS (2021) University of Chicago (Computer Science)
  • BS (2018) Rochester Institute of Technology (Computer Science and Mathematics)

Research

Cryptography and provable security, especially the following: highly secure data structures (e.g., private information retrieval and oblivious RAM), security limitations of efficient data structures and their security vulnerabilities, and cryptography for AI

General Information

See my website for more details.

Experience

Postdoctoral Scholar, University of Chicago, 2024-25
PhD Student Researcher, Google, 2023-24
PhD Student Internship, Meta, Summer 2022
Student Co-op, BMW Manufacturing, Spring 2018

Appointments

Stevens Institute of Technology, Assistant Professor, 2025 - present

Professional Societies

  • IACR – International Association for Cryptologic Research Member

Selected Publications

Conference Proceeding

  1. Cohen, A.; Hoover, A.; Schoenbach, G. (2025). Watermarking Language Models for Many Adaptive Users. 2025 IEEE Symposium on Security and Privacy (SP) (pp. 84-84). Los Alamitos, CA, USA: IEEE Computer Society.
    https://doi.ieeecomputersociety.org/10.1109/SP61157.2025.00084.
  2. Hoover, A.; Ng, R.; Khu, D.; Yao\textquoterightAn Li; Lim, J.; Ng, D.; Lim, J.; Song, Y. (2024). Leakage-Abuse Attacks Against Structured Encryption for SQL. 33rd USENIX Security Symposium (USENIX Security 24) (pp. 7411--7428). Philadelphia, PA: USENIX Association.
    https://www.usenix.org/conference/usenixsecurity24/presentation/hoover.
  3. Cash, D.; Drucker, A.; Hoover, A.; Pass, R.; Pietrzak, K. (2020). A Lower Bound for One-Round Oblivious RAM. Theory of Cryptography (pp. 457--485). Cham: Springer International Publishing.
  4. Baker, J. M.; Duckering, C.; Hoover, A.; Chong, F. T. (2020). Time-sliced quantum circuit partitioning for modular architectures. Proceedings of the 17th ACM International Conference on Computing Frontiers (pp. 98–107). New York, NY, USA: Association for Computing Machinery.
    https://doi.org/10.1145/3387902.3392617.

Journal Article

  1. Ng, R.; Hoover, A.; Cash, D.; Ee, E. (2025). Structured Encryption for Indirect Addressing. IACR Communications in Cryptology (1 ed., vol. 2). International Association for Cryptologic Research.
  2. Baker, J. M.; Duckering, C.; Hoover, A.; Chong, F. T. (2019). Decomposing quantum generalized Toffoli with an arbitrary number of ancilla. arXiv preprint arXiv:1904.01671.
  3. Fitzsimmons, Z.; Hemaspaandra, E.; Hoover, A.; Narváez, D. E. (2019). Very Hard Electoral Control Problems. Proceedings of the AAAI Conference on Artificial Intelligence (01 ed., vol. 33, pp. 1933-1940).
    https://ojs.aaai.org/index.php/AAAI/article/view/4021.

Other

  1. Seah, R.; Khu, D.; Hoover, A.; Ng, R. (2024). LAMA: Leakage-Abuse Attacks Against Microsoft Always Encrypted.
    https://eprint.iacr.org/2024/1308.