Certificate transparency B Laurie Communications of the ACM 57 (10), 40-46, 2014 | 339 | 2014 |
Faster and timing-attack resistant AES-GCM E Käsper, P Schwabe International Workshop on Cryptographic Hardware and Embedded Systems, 1-17, 2009 | 277 | 2009 |
{DROWN}: Breaking {TLS} Using SSLv2 N Aviram, S Schinzel, J Somorovsky, N Heninger, M Dankel, J Steube, ... 25th {USENIX} Security Symposium ({USENIX} Security 16), 689-706, 2016 | 183 | 2016 |
{DROWN}: Breaking {TLS} Using SSLv2 N Aviram, S Schinzel, J Somorovsky, N Heninger, M Dankel, J Steube, ... 25th {USENIX} Security Symposium ({USENIX} Security 16), 689-706, 2016 | 183 | 2016 |
Fast elliptic curve cryptography in OpenSSL E Käsper International Conference on Financial Cryptography and Data Security, 27-39, 2011 | 76 | 2011 |
Revocation transparency B Laurie, E Kasper Google Research, September 33, 2012 | 68 | 2012 |
Multilingual and cross-lingual news topic tracking B Pouliquen, R Steinberger, C Ignat, E Käsper, I Temnikova COLING 2004: Proceedings of the 20th International Conference on …, 2004 | 66 | 2004 |
Rfc6962: Certificate transparency B Laurie, A Langley, E Kasper Request for Comments. IETF, 2013 | 43 | 2013 |
The LANE hash function S Indesteege, E Andreeva, C De Canniere, O Dunkelman, E Käsper, ... Dagstuhl Seminar Proceedings, 2009 | 38 | 2009 |
Distinguishers for the compression function and output transformation of Hamsi-256 JP Aumasson, E Käsper, LR Knudsen, K Matusiewicz, R Ødegård, ... Australasian Conference on Information Security and Privacy, 87-103, 2010 | 30 | 2010 |
Certificate transparency A Langley, E Kasper, B Laurie Internet Engineering Task Force, 2013 | 23 | 2013 |
The wisdom of Crowds: attacks and optimal constructions G Danezis, C Diaz, E Käsper, C Troncoso European Symposium on Research in Computer Security, 406-423, 2009 | 23 | 2009 |
Correlated Keystreams in Moustique E Käsper, V Rijmen, TE Bjørstad, C Rechberger, M Robshaw, G Sekar International Conference on Cryptology in Africa, 246-257, 2008 | 23 | 2008 |
Efficient negative databases from cryptographic hash functions G Danezis, C Diaz, S Faust, E Käsper, C Troncoso, B Preneel International Conference on Information Security, 423-436, 2007 | 23 | 2007 |
Strongly multiplicative hierarchical threshold secret sharing E Käsper, V Nikov, S Nikova International Conference on Information Theoretic Security, 148-168, 2007 | 17 | 2007 |
Certificate authority transparency and auditability B Laurie, A Langley, E Kasper ØØÔ»» ÛÛۺРÒ× ºÓÖ» Ð×» ÖØ Ø ÙØ ÓÖ ØÝÌÖ Ò× Ô Ö Ò Ý Ò Ù Ø Ð ØÝºÔ, 124, 2011 | 15 | 2011 |
The LANE hash function. Submission to NIST (2008) S Indesteege, E Andreeva, C De Canniere, O Dunkelman, E Käsper, ... | 14 | |
Certificate Transparency v2. 1a B Laurie, E Kasper Links. org, September, 2012 | 12 | 2012 |
Certificate transparency version 2.0 B Laurie, A Langley, E Kasper, E Messeri, R Stradling Internet-Draft draft-ietf-trans-rfc6962-bis-27, Internet Engineering Task Force, 2017 | 10 | 2017 |
Revocation transparency (2012) B Laurie, E Kasper URL http://sump2. links. org/files/RevocationTransparency. pdf, 0 | 9 | |