Emilia Kasper
Emilia Kasper
Software engineer, Google
Verified email at google.com
Title
Cited by
Cited by
Year
Certificate transparency
B Laurie
Communications of the ACM 57 (10), 40-46, 2014
3392014
Faster and timing-attack resistant AES-GCM
E Ksper, P Schwabe
International Workshop on Cryptographic Hardware and Embedded Systems, 1-17, 2009
2772009
{DROWN}: Breaking {TLS} Using SSLv2
N Aviram, S Schinzel, J Somorovsky, N Heninger, M Dankel, J Steube, ...
25th {USENIX} Security Symposium ({USENIX} Security 16), 689-706, 2016
1832016
{DROWN}: Breaking {TLS} Using SSLv2
N Aviram, S Schinzel, J Somorovsky, N Heninger, M Dankel, J Steube, ...
25th {USENIX} Security Symposium ({USENIX} Security 16), 689-706, 2016
1832016
Fast elliptic curve cryptography in OpenSSL
E Ksper
International Conference on Financial Cryptography and Data Security, 27-39, 2011
762011
Revocation transparency
B Laurie, E Kasper
Google Research, September 33, 2012
682012
Multilingual and cross-lingual news topic tracking
B Pouliquen, R Steinberger, C Ignat, E Ksper, I Temnikova
COLING 2004: Proceedings of the 20th International Conference on…, 2004
662004
Rfc6962: Certificate transparency
B Laurie, A Langley, E Kasper
Request for Comments. IETF, 2013
432013
The LANE hash function
S Indesteege, E Andreeva, C De Canniere, O Dunkelman, E Ksper, ...
Dagstuhl Seminar Proceedings, 2009
382009
Distinguishers for the compression function and output transformation of Hamsi-256
JP Aumasson, E Ksper, LR Knudsen, K Matusiewicz, R degrd, ...
Australasian Conference on Information Security and Privacy, 87-103, 2010
302010
Certificate transparency
A Langley, E Kasper, B Laurie
Internet Engineering Task Force, 2013
232013
The wisdom of Crowds: attacks and optimal constructions
G Danezis, C Diaz, E Ksper, C Troncoso
European Symposium on Research in Computer Security, 406-423, 2009
232009
Correlated Keystreams in Moustique
E Ksper, V Rijmen, TE Bjrstad, C Rechberger, M Robshaw, G Sekar
International Conference on Cryptology in Africa, 246-257, 2008
232008
Efficient negative databases from cryptographic hash functions
G Danezis, C Diaz, S Faust, E Ksper, C Troncoso, B Preneel
International Conference on Information Security, 423-436, 2007
232007
Strongly multiplicative hierarchical threshold secret sharing
E Ksper, V Nikov, S Nikova
International Conference on Information Theoretic Security, 148-168, 2007
172007
Certificate authority transparency and auditability
B Laurie, A Langley, E Kasper
Ի ۺ ֻ ׻ ݺ, 124, 2011
152011
The LANE hash function. Submission to NIST (2008)
S Indesteege, E Andreeva, C De Canniere, O Dunkelman, E Ksper, ...
14
Certificate Transparency v2. 1a
B Laurie, E Kasper
Links. org, September, 2012
122012
Certificate transparency version 2.0
B Laurie, A Langley, E Kasper, E Messeri, R Stradling
Internet-Draft draft-ietf-trans-rfc6962-bis-27, Internet Engineering Task Force, 2017
102017
Revocation transparency (2012)
B Laurie, E Kasper
URL http://sump2. links. org/files/RevocationTransparency. pdf, 0
9
The system can't perform the operation now. Try again later.
Articles 1–20