Artikel mit Open-Access-Mandaten - Nadia HeningerWeitere Informationen
Verfügbar: 33
Imperfect forward secrecy: How Diffie-Hellman fails in practice
D Adrian, K Bhargavan, Z Durumeric, P Gaudry, M Green, JA Halderman, ...
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
Mandate: European Commission
CacheBleed: a timing attack on OpenSSL constant-time RSA
Y Yarom, D Genkin, N Heninger
Journal of Cryptographic Engineering 7, 99-112, 2017
Mandate: US National Science Foundation
{DROWN}: Breaking {TLS} Using {SSLv2}
N Aviram, S Schinzel, J Somorovsky, N Heninger, M Dankel, J Steube, ...
25th USENIX Security Symposium (USENIX Security 16), 689-706, 2016
Mandate: US National Science Foundation
{TPM-FAIL}:{TPM} meets Timing and Lattice Attacks
D Moghimi, B Sunar, T Eisenbarth, N Heninger
29th USENIX Security Symposium (USENIX Security 20), 2057-2073, 2020
Mandate: US National Science Foundation
A Systematic Analysis of the Juniper Dual EC Incident
S Checkoway, S Cohney, C Garman, M Green, N Heninger, J Maskiewicz, ...
Mandate: US National Science Foundation
Biased nonce sense: Lattice attacks against weak ECDSA signatures in cryptocurrencies
J Breitner, N Heninger
Financial Cryptography and Data Security: 23rd International Conference, FC …, 2019
Mandate: US National Science Foundation
Cachequote: Efficiently recovering long-term secrets of SGX EPID via cache attacks
F Dall, G De Micheli, T Eisenbarth, D Genkin, N Heninger, A Moghimi, ...
IACR Transactions on Cryptographic Hardware and Embedded Systems, 2018
Mandate: US National Science Foundation, US Department of Defense
Post-quantum RSA
DJ Bernstein, N Heninger, P Lou, L Valenta
Post-Quantum Cryptography: 8th International Workshop, PQCrypto 2017 …, 2017
Mandate: US National Science Foundation, Netherlands Organisation for Scientific …
Comparing the difficulty of factorization and discrete logarithm: a 240-digit experiment
F Boudot, P Gaudry, A Guillevic, N Heninger, E Thomé, P Zimmermann
Advances in Cryptology–CRYPTO 2020: 40th Annual International Cryptology …, 2020
Mandate: US National Science Foundation
Sliding right into disaster: Left-to-right sliding windows leak
DJ Bernstein, J Breitner, D Genkin, L Groot Bruinderink, N Heninger, ...
Mandate: US National Science Foundation, US Department of Defense, Netherlands …
{CopyCat}: Controlled {Instruction-Level} attacks on enclaves
D Moghimi, J Van Bulck, N Heninger, F Piessens, B Sunar
29th USENIX security symposium (USENIX security 20), 469-486, 2020
Mandate: US National Science Foundation, Research Foundation (Flanders)
Weak keys remain widespread in network devices
M Hastings, J Fried, N Heninger
Proceedings of the 2016 Internet Measurement Conference, 49-63, 2016
Mandate: US National Science Foundation
A kilobit hidden SNFS discrete logarithm computation
J Fried, P Gaudry, N Heninger, E Thomé
Annual International Conference on the Theory and Applications of …, 2017
Mandate: US National Science Foundation
Factoring as a Service
L Valenta, S Cohney, A Liao, J Fried, S Bodduluri, N Heninger
Mandate: US National Science Foundation
Pseudorandom black swans: Cache attacks on CTR_DRBG
S Cohney, A Kwong, S Paz, D Genkin, N Heninger, E Ronen, Y Yarom
2020 IEEE Symposium on Security and Privacy (SP), 1241-1258, 2020
Mandate: US National Science Foundation, US Department of Defense
Measuring Small Subgroup Attacks Against Diffie-Hellman (ePrint)
L Valenta, D Adrian, A Sanso, S Cohney, J Fried, M Hastings, ...
NDSS 2017, 2017
Mandate: US National Science Foundation
In search of CurveSwap: Measuring elliptic curve implementations in the wild
L Valenta, N Sullivan, A Sanso, N Heninger
2018 IEEE European Symposium on Security and Privacy (EuroS&P), 384-398, 2018
Mandate: US National Science Foundation
On bounded distance decoding with predicate: Breaking the “lattice barrier” for the hidden number problem
MR Albrecht, N Heninger
Annual International Conference on the Theory and Applications of …, 2021
Mandate: US National Science Foundation, UK Engineering and Physical Sciences …
Practical state recovery attacks against legacy RNG implementations
SN Cohney, MD Green, N Heninger
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
Mandate: US National Science Foundation, US Department of Defense
Fast practical lattice reduction through iterated compression
K Ryan, N Heninger
Annual International Cryptology Conference, 3-36, 2023
Mandate: US National Science Foundation
Angaben zur Publikation und Finanzierung werden automatisch von einem Computerprogramm ermittelt