BibTeX records: Nadia Heninger

download as .bib file

@inproceedings{DBLP:conf/africacrypt/RoweBH23,
  author       = {Dylan Rowe and
                  Joachim Breitner and
                  Nadia Heninger},
  editor       = {Nadia El Mrabet and
                  Luca De Feo and
                  Sylvain Duquesne},
  title        = {The Curious Case of the Half-Half Bitcoin {ECDSA} Nonces},
  booktitle    = {Progress in Cryptology - {AFRICACRYPT} 2023 - 14th International Conference
                  on Cryptology in Africa, Sousse, Tunisia, July 19-21, 2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {14064},
  pages        = {273--284},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-37679-5\_12},
  doi          = {10.1007/978-3-031-37679-5\_12},
  timestamp    = {Fri, 21 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/africacrypt/RoweBH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/RyanHSH23,
  author       = {Keegan Ryan and
                  Kaiwen He and
                  George Arnold Sullivan and
                  Nadia Heninger},
  editor       = {Weizhi Meng and
                  Christian Damsgaard Jensen and
                  Cas Cremers and
                  Engin Kirda},
  title        = {Passive {SSH} Key Compromise via Lattices},
  booktitle    = {Proceedings of the 2023 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2023, Copenhagen, Denmark, November
                  26-30, 2023},
  pages        = {2886--2900},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3576915.3616629},
  doi          = {10.1145/3576915.3616629},
  timestamp    = {Tue, 28 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/RyanHSH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/RyanH23,
  author       = {Keegan Ryan and
                  Nadia Heninger},
  editor       = {Helena Handschuh and
                  Anna Lysyanskaya},
  title        = {Fast Practical Lattice Reduction Through Iterated Compression},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International
                  Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August
                  20-24, 2023, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14083},
  pages        = {3--36},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-38548-3\_1},
  doi          = {10.1007/978-3-031-38548-3\_1},
  timestamp    = {Fri, 18 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/RyanH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/HeningerR23,
  author       = {Nadia Heninger and
                  Keegan Ryan},
  editor       = {Alexandra Boldyreva and
                  Vladimir Kolesnikov},
  title        = {The Hidden Number Problem with Small Unknown Multipliers: Cryptanalyzing
                  {MEGA} in Six Queries and Other Applications},
  booktitle    = {Public-Key Cryptography - {PKC} 2023 - 26th {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Atlanta, GA, USA,
                  May 7-10, 2023, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13940},
  pages        = {147--176},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-31368-4\_6},
  doi          = {10.1007/978-3-031-31368-4\_6},
  timestamp    = {Wed, 17 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/HeningerR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/RyanH23,
  author       = {Keegan Ryan and
                  Nadia Heninger},
  title        = {Fast Practical Lattice Reduction through Iterated Compression},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {237},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/237},
  timestamp    = {Tue, 28 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/RyanH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DavisGHRS23,
  author       = {Hannah Davis and
                  Matthew Green and
                  Nadia Heninger and
                  Keegan Ryan and
                  Adam Suhl},
  title        = {On the Possibility of a Backdoor in the Micali-Schnorr Generator},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {440},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/440},
  timestamp    = {Fri, 31 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DavisGHRS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/RoweBH23,
  author       = {Dylan Rowe and
                  Joachim Breitner and
                  Nadia Heninger},
  title        = {The curious case of the half-half Bitcoin {ECDSA} nonces},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {841},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/841},
  timestamp    = {Mon, 03 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/RoweBH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BeckEGHJ23,
  author       = {Gabrielle Beck and
                  Harry Eldridge and
                  Matthew Green and
                  Nadia Heninger and
                  Abhishek Jain},
  title        = {Abuse-Resistant Location Tracking: Balancing Privacy and Safety in
                  the Offline Finding Ecosystem},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1332},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/1332},
  timestamp    = {Sat, 07 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BeckEGHJ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/RyanHSH23,
  author       = {Keegan Ryan and
                  Kaiwen He and
                  George Arnold Sullivan and
                  Nadia Heninger},
  title        = {Passive {SSH} Key Compromise via Lattices},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1711},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/1711},
  timestamp    = {Thu, 09 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/RyanHSH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/BoudotGGHTZ22,
  author       = {Fabrice Boudot and
                  Pierrick Gaudry and
                  Aurore Guillevic and
                  Nadia Heninger and
                  Emmanuel Thom{\'{e}} and
                  Paul Zimmermann},
  title        = {The State of the Art in Integer Factoring and Breaking Public-Key
                  Cryptography},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {20},
  number       = {2},
  pages        = {80--86},
  year         = {2022},
  url          = {https://doi.org/10.1109/MSEC.2022.3141918},
  doi          = {10.1109/MSEC.2022.3141918},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/BoudotGGHTZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/SullivanSHW22,
  author       = {George Arnold Sullivan and
                  Jackson Sippe and
                  Nadia Heninger and
                  Eric Wustrow},
  editor       = {Kevin R. B. Butler and
                  Kurt Thomas},
  title        = {Open to a fault: On the passive compromise of {TLS} keys via transient
                  errors},
  booktitle    = {31st {USENIX} Security Symposium, {USENIX} Security 2022, Boston,
                  MA, USA, August 10-12, 2022},
  pages        = {233--250},
  publisher    = {{USENIX} Association},
  year         = {2022},
  url          = {https://www.usenix.org/conference/usenixsecurity22/presentation/sullivan},
  timestamp    = {Tue, 18 Oct 2022 17:10:36 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/SullivanSHW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Heninger22,
  author       = {Nadia Heninger},
  title        = {RSA, DH, and {DSA} in the Wild},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {48},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/048},
  timestamp    = {Fri, 18 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/Heninger22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/RyanH22,
  author       = {Keegan Ryan and
                  Nadia Heninger},
  title        = {Cryptanalyzing {MEGA} in Six Queries},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {914},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/914},
  timestamp    = {Tue, 27 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/RyanH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/AlbrechtH21,
  author       = {Martin R. Albrecht and
                  Nadia Heninger},
  editor       = {Anne Canteaut and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {On Bounded Distance Decoding with Predicate: Breaking the "Lattice
                  Barrier" for the Hidden Number Problem},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2021 - 40th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Zagreb, Croatia, October 17-21, 2021, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12696},
  pages        = {528--558},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-77870-5\_19},
  doi          = {10.1007/978-3-030-77870-5\_19},
  timestamp    = {Wed, 16 Jun 2021 11:49:32 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/AlbrechtH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/FalkHR20,
  author       = {Brett Hemenway Falk and
                  Nadia Heninger and
                  Michael Rudow},
  title        = {Properties of constacyclic codes under the Schur product},
  journal      = {Des. Codes Cryptogr.},
  volume       = {88},
  number       = {6},
  pages        = {993--1021},
  year         = {2020},
  url          = {https://doi.org/10.1007/s10623-020-00720-3},
  doi          = {10.1007/S10623-020-00720-3},
  timestamp    = {Tue, 16 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/FalkHR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/MicheliHS20,
  author       = {Gabrielle De Micheli and
                  Nadia Heninger and
                  Barak Shani},
  title        = {Characterizing overstretched {NTRU} attacks},
  journal      = {J. Math. Cryptol.},
  volume       = {14},
  number       = {1},
  pages        = {110--119},
  year         = {2020},
  url          = {https://doi.org/10.1515/jmc-2015-0055},
  doi          = {10.1515/JMC-2015-0055},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jmc/MicheliHS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BoudotGGHTZ20,
  author       = {Fabrice Boudot and
                  Pierrick Gaudry and
                  Aurore Guillevic and
                  Nadia Heninger and
                  Emmanuel Thom{\'{e}} and
                  Paul Zimmermann},
  editor       = {Daniele Micciancio and
                  Thomas Ristenpart},
  title        = {Comparing the Difficulty of Factorization and Discrete Logarithm:
                  {A} 240-Digit Experiment},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2020 - 40th Annual International
                  Cryptology Conference, {CRYPTO} 2020, Santa Barbara, CA, USA, August
                  17-21, 2020, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12171},
  pages        = {62--91},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-56880-1\_3},
  doi          = {10.1007/978-3-030-56880-1\_3},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BoudotGGHTZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/CohneyKPGHRY20,
  author       = {Shaanan Cohney and
                  Andrew Kwong and
                  Shahar Paz and
                  Daniel Genkin and
                  Nadia Heninger and
                  Eyal Ronen and
                  Yuval Yarom},
  title        = {Pseudorandom Black Swans: Cache Attacks on CTR{\_}DRBG},
  booktitle    = {2020 {IEEE} Symposium on Security and Privacy, {SP} 2020, San Francisco,
                  CA, USA, May 18-21, 2020},
  pages        = {1241--1258},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/SP40000.2020.00046},
  doi          = {10.1109/SP40000.2020.00046},
  timestamp    = {Thu, 21 Sep 2023 15:57:24 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/CohneyKPGHRY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/MoghimiBHPS20,
  author       = {Daniel Moghimi and
                  Jo Van Bulck and
                  Nadia Heninger and
                  Frank Piessens and
                  Berk Sunar},
  editor       = {Srdjan Capkun and
                  Franziska Roesner},
  title        = {CopyCat: Controlled Instruction-Level Attacks on Enclaves},
  booktitle    = {29th {USENIX} Security Symposium, {USENIX} Security 2020, August 12-14,
                  2020},
  pages        = {469--486},
  publisher    = {{USENIX} Association},
  year         = {2020},
  url          = {https://www.usenix.org/conference/usenixsecurity20/presentation/moghimi-copycat},
  timestamp    = {Fri, 29 Jan 2021 22:08:55 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/MoghimiBHPS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/MoghimiS0H20,
  author       = {Daniel Moghimi and
                  Berk Sunar and
                  Thomas Eisenbarth and
                  Nadia Heninger},
  editor       = {Srdjan Capkun and
                  Franziska Roesner},
  title        = {{TPM-FAIL:} {TPM} meets Timing and Lattice Attacks},
  booktitle    = {29th {USENIX} Security Symposium, {USENIX} Security 2020, August 12-14,
                  2020},
  pages        = {2057--2073},
  publisher    = {{USENIX} Association},
  year         = {2020},
  url          = {https://www.usenix.org/conference/usenixsecurity20/presentation/moghimi-tpm},
  timestamp    = {Fri, 29 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/MoghimiS0H20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/fc/2020,
  editor       = {Joseph Bonneau and
                  Nadia Heninger},
  title        = {Financial Cryptography and Data Security - 24th International Conference,
                  {FC} 2020, Kota Kinabalu, Malaysia, February 10-14, 2020 Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12059},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-51280-4},
  doi          = {10.1007/978-3-030-51280-4},
  isbn         = {978-3-030-51279-8},
  timestamp    = {Wed, 22 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/2020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2002-08437,
  author       = {Daniel Moghimi and
                  Jo Van Bulck and
                  Nadia Heninger and
                  Frank Piessens and
                  Berk Sunar},
  title        = {CopyCat: Controlled Instruction-Level Attacks on Enclaves for Maximal
                  Key Extraction},
  journal      = {CoRR},
  volume       = {abs/2002.08437},
  year         = {2020},
  url          = {https://arxiv.org/abs/2002.08437},
  eprinttype    = {arXiv},
  eprint       = {2002.08437},
  timestamp    = {Mon, 02 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2002-08437.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2006-06197,
  author       = {Fabrice Boudot and
                  Pierrick Gaudry and
                  Aurore Guillevic and
                  Nadia Heninger and
                  Emmanuel Thom{\'{e}} and
                  Paul Zimmermann},
  title        = {Comparing the difficulty of factorization and discrete logarithm:
                  a 240-digit experiment},
  journal      = {CoRR},
  volume       = {abs/2006.06197},
  year         = {2020},
  url          = {https://arxiv.org/abs/2006.06197},
  eprinttype    = {arXiv},
  eprint       = {2006.06197},
  timestamp    = {Sat, 13 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2006-06197.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BoudotGGHTZ20,
  author       = {Fabrice Boudot and
                  Pierrick Gaudry and
                  Aurore Guillevic and
                  Nadia Heninger and
                  Emmanuel Thom{\'{e}} and
                  Paul Zimmermann},
  title        = {Comparing the difficulty of factorization and discrete logarithm:
                  a 240-digit experiment},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {697},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/697},
  timestamp    = {Tue, 30 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BoudotGGHTZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MicheliH20,
  author       = {Gabrielle De Micheli and
                  Nadia Heninger},
  title        = {Recovering cryptographic keys from partial information, by example},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1506},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/1506},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/MicheliH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AlbrechtH20,
  author       = {Martin R. Albrecht and
                  Nadia Heninger},
  title        = {On Bounded Distance Decoding with Predicate: Breaking the "Lattice
                  Barrier" for the Hidden Number Problem},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1540},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/1540},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/AlbrechtH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cacm/AdrianBDGGHHSTV19,
  author       = {David Adrian and
                  Karthikeyan Bhargavan and
                  Zakir Durumeric and
                  Pierrick Gaudry and
                  Matthew Green and
                  J. Alex Halderman and
                  Nadia Heninger and
                  Drew Springall and
                  Emmanuel Thom{\'{e}} and
                  Luke Valenta and
                  Benjamin VanderSloot and
                  Eric Wustrow and
                  Santiago Zanella B{\'{e}}guelin and
                  Paul Zimmermann},
  title        = {Imperfect forward secrecy: how Diffie-Hellman fails in practice},
  journal      = {Commun. {ACM}},
  volume       = {62},
  number       = {1},
  pages        = {106--114},
  year         = {2019},
  url          = {https://doi.org/10.1145/3292035},
  doi          = {10.1145/3292035},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cacm/AdrianBDGGHHSTV19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/BreitnerH19,
  author       = {Joachim Breitner and
                  Nadia Heninger},
  editor       = {Ian Goldberg and
                  Tyler Moore},
  title        = {Biased Nonce Sense: Lattice Attacks Against Weak {ECDSA} Signatures
                  in Cryptocurrencies},
  booktitle    = {Financial Cryptography and Data Security - 23rd International Conference,
                  {FC} 2019, Frigate Bay, St. Kitts and Nevis, February 18-22, 2019,
                  Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11598},
  pages        = {3--20},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-32101-7\_1},
  doi          = {10.1007/978-3-030-32101-7\_1},
  timestamp    = {Wed, 12 Aug 2020 17:59:02 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/BreitnerH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/HastingsHW19,
  author       = {Marcella Hastings and
                  Nadia Heninger and
                  Eric Wustrow},
  editor       = {Ian Goldberg and
                  Tyler Moore},
  title        = {Short Paper: The Proof is in the Pudding - Proofs of Work for Solving
                  Discrete Logarithms},
  booktitle    = {Financial Cryptography and Data Security - 23rd International Conference,
                  {FC} 2019, Frigate Bay, St. Kitts and Nevis, February 18-22, 2019,
                  Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11598},
  pages        = {396--404},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-32101-7\_24},
  doi          = {10.1007/978-3-030-32101-7\_24},
  timestamp    = {Mon, 14 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/HastingsHW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/uss/2019,
  editor       = {Nadia Heninger and
                  Patrick Traynor},
  title        = {28th {USENIX} Security Symposium, {USENIX} Security 2019, Santa Clara,
                  CA, USA, August 14-16, 2019},
  publisher    = {{USENIX} Association},
  year         = {2019},
  url          = {https://www.usenix.org/conference/usenixsecurity19},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/2019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1911-05673,
  author       = {Daniel Moghimi and
                  Berk Sunar and
                  Thomas Eisenbarth and
                  Nadia Heninger},
  title        = {{TPM-FAIL:} {TPM} meets Timing and Lattice Attacks},
  journal      = {CoRR},
  volume       = {abs/1911.05673},
  year         = {2019},
  url          = {http://arxiv.org/abs/1911.05673},
  eprinttype    = {arXiv},
  eprint       = {1911.05673},
  timestamp    = {Mon, 02 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1911-05673.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BreitnerH19,
  author       = {Joachim Breitner and
                  Nadia Heninger},
  title        = {Biased Nonce Sense: Lattice Attacks against Weak {ECDSA} Signatures
                  in Cryptocurrencies},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {23},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/023},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BreitnerH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CohneyKPGHRY19,
  author       = {Shaanan Cohney and
                  Andrew Kwong and
                  Shahar Paz and
                  Daniel Genkin and
                  Nadia Heninger and
                  Eyal Ronen and
                  Yuval Yarom},
  title        = {Pseudorandom Black Swans: Cache Attacks on CTR{\_}DRBG},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {996},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/996},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CohneyKPGHRY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cacm/CheckowayMGFCGH18,
  author       = {Stephen Checkoway and
                  Jacob Maskiewicz and
                  Christina Garman and
                  Joshua Fried and
                  Shaanan Cohney and
                  Matthew Green and
                  Nadia Heninger and
                  Ralf{-}Philipp Weinmann and
                  Eric Rescorla and
                  Hovav Shacham},
  title        = {Where did {I} leave my keys?: lessons from the Juniper Dual {EC} incident},
  journal      = {Commun. {ACM}},
  volume       = {61},
  number       = {11},
  pages        = {148--155},
  year         = {2018},
  url          = {https://doi.org/10.1145/3266291},
  doi          = {10.1145/3266291},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cacm/CheckowayMGFCGH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/DallMEGHMY18,
  author       = {Fergus Dall and
                  Gabrielle De Micheli and
                  Thomas Eisenbarth and
                  Daniel Genkin and
                  Nadia Heninger and
                  Ahmad Moghimi and
                  Yuval Yarom},
  title        = {CacheQuote: Efficiently Recovering Long-term Secrets of {SGX} {EPID}
                  via Cache Attacks},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2018},
  number       = {2},
  pages        = {171--191},
  year         = {2018},
  url          = {https://doi.org/10.13154/tches.v2018.i2.171-191},
  doi          = {10.13154/TCHES.V2018.I2.171-191},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tches/DallMEGHMY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/CohneyGH18,
  author       = {Shaanan N. Cohney and
                  Matthew D. Green and
                  Nadia Heninger},
  editor       = {David Lie and
                  Mohammad Mannan and
                  Michael Backes and
                  XiaoFeng Wang},
  title        = {Practical State Recovery Attacks against Legacy {RNG} Implementations},
  booktitle    = {Proceedings of the 2018 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2018, Toronto, ON, Canada, October
                  15-19, 2018},
  pages        = {265--280},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3243734.3243756},
  doi          = {10.1145/3243734.3243756},
  timestamp    = {Tue, 10 Nov 2020 20:00:51 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/CohneyGH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosp/ValentaSSH18,
  author       = {Luke Valenta and
                  Nick Sullivan and
                  Antonio Sanso and
                  Nadia Heninger},
  title        = {In Search of CurveSwap: Measuring Elliptic Curve Implementations in
                  the Wild},
  booktitle    = {2018 {IEEE} European Symposium on Security and Privacy, EuroS{\&}P
                  2018, London, United Kingdom, April 24-26, 2018},
  pages        = {384--398},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/EuroSP.2018.00034},
  doi          = {10.1109/EUROSP.2018.00034},
  timestamp    = {Wed, 16 Oct 2019 14:14:55 +0200},
  biburl       = {https://dblp.org/rec/conf/eurosp/ValentaSSH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1810-07630,
  author       = {Brett Hemenway Falk and
                  Nadia Heninger and
                  Michael Rudow},
  title        = {Properties of Constacyclic Codes Under the Schur Product},
  journal      = {CoRR},
  volume       = {abs/1810.07630},
  year         = {2018},
  url          = {http://arxiv.org/abs/1810.07630},
  eprinttype    = {arXiv},
  eprint       = {1810.07630},
  timestamp    = {Tue, 30 Oct 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1810-07630.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ValentaSSH18,
  author       = {Luke Valenta and
                  Nick Sullivan and
                  Antonio Sanso and
                  Nadia Heninger},
  title        = {In search of CurveSwap: Measuring elliptic curve implementations in
                  the wild},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {298},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/298},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ValentaSSH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MicheliHS18,
  author       = {Gabrielle De Micheli and
                  Nadia Heninger and
                  Barak Shani},
  title        = {Characterizing overstretched {NTRU} attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {630},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/630},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MicheliHS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HastingsHW18,
  author       = {Marcella Hastings and
                  Nadia Heninger and
                  Eric Wustrow},
  title        = {The Proof is in the Pudding: Proofs of Work for Solving Discrete Logarithms},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {939},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/939},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HastingsHW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/YaromGH17,
  author       = {Yuval Yarom and
                  Daniel Genkin and
                  Nadia Heninger},
  title        = {CacheBleed: a timing attack on OpenSSL constant-time {RSA}},
  journal      = {J. Cryptogr. Eng.},
  volume       = {7},
  number       = {2},
  pages        = {99--112},
  year         = {2017},
  url          = {https://doi.org/10.1007/s13389-017-0152-y},
  doi          = {10.1007/S13389-017-0152-Y},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/YaromGH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/BernsteinBGBHLV17,
  author       = {Daniel J. Bernstein and
                  Joachim Breitner and
                  Daniel Genkin and
                  Leon Groot Bruinderink and
                  Nadia Heninger and
                  Tanja Lange and
                  Christine van Vredendaal and
                  Yuval Yarom},
  editor       = {Wieland Fischer and
                  Naofumi Homma},
  title        = {Sliding Right into Disaster: Left-to-Right Sliding Windows Leak},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2017 - 19th International
                  Conference, Taipei, Taiwan, September 25-28, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10529},
  pages        = {555--576},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-66787-4\_27},
  doi          = {10.1007/978-3-319-66787-4\_27},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/BernsteinBGBHLV17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/FriedGHT17,
  author       = {Joshua Fried and
                  Pierrick Gaudry and
                  Nadia Heninger and
                  Emmanuel Thom{\'{e}}},
  editor       = {Jean{-}S{\'{e}}bastien Coron and
                  Jesper Buus Nielsen},
  title        = {A Kilobit Hidden {SNFS} Discrete Logarithm Computation},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2017 - 36th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Paris, France, April 30 - May 4, 2017, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10210},
  pages        = {202--231},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-56620-7\_8},
  doi          = {10.1007/978-3-319-56620-7\_8},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/FriedGHT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/ValentaASCFHHH17,
  author       = {Luke Valenta and
                  David Adrian and
                  Antonio Sanso and
                  Shaanan Cohney and
                  Joshua Fried and
                  Marcella Hastings and
                  J. Alex Halderman and
                  Nadia Heninger},
  title        = {Measuring small subgroup attacks against Diffie-Hellman},
  booktitle    = {24th Annual Network and Distributed System Security Symposium, {NDSS}
                  2017, San Diego, California, USA, February 26 - March 1, 2017},
  publisher    = {The Internet Society},
  year         = {2017},
  url          = {https://www.ndss-symposium.org/ndss2017/ndss-2017-programme/measuring-small-subgroup-attacks-against-diffie-hellman/},
  timestamp    = {Mon, 01 Feb 2021 08:42:15 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/ValentaASCFHHH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pqcrypto/BernsteinHLV17,
  author       = {Daniel J. Bernstein and
                  Nadia Heninger and
                  Paul Lou and
                  Luke Valenta},
  editor       = {Tanja Lange and
                  Tsuyoshi Takagi},
  title        = {Post-quantum {RSA}},
  booktitle    = {Post-Quantum Cryptography - 8th International Workshop, PQCrypto 2017,
                  Utrecht, The Netherlands, June 26-28, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10346},
  pages        = {311--329},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-59879-6\_18},
  doi          = {10.1007/978-3-319-59879-6\_18},
  timestamp    = {Tue, 14 May 2019 10:00:42 +0200},
  biburl       = {https://dblp.org/rec/conf/pqcrypto/BernsteinHLV17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BernsteinHLV17,
  author       = {Daniel J. Bernstein and
                  Nadia Heninger and
                  Paul Lou and
                  Luke Valenta},
  title        = {Post-quantum {RSA}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {351},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/351},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BernsteinHLV17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BernsteinBGBHLV17,
  author       = {Daniel J. Bernstein and
                  Joachim Breitner and
                  Daniel Genkin and
                  Leon Groot Bruinderink and
                  Nadia Heninger and
                  Tanja Lange and
                  Christine van Vredendaal and
                  Yuval Yarom},
  title        = {Sliding right into disaster: Left-to-right sliding windows leak},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {627},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/627},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BernsteinBGBHLV17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/ChinburgHHS16,
  author       = {Ted Chinburg and
                  Brett Hemenway and
                  Nadia Heninger and
                  Zachary Scherr},
  editor       = {Jung Hee Cheon and
                  Tsuyoshi Takagi},
  title        = {Cryptographic Applications of Capacity Theory: On the Optimality of
                  Coppersmith's Method for Univariate Polynomials},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2016 - 22nd International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10031},
  pages        = {759--788},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53887-6\_28},
  doi          = {10.1007/978-3-662-53887-6\_28},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/ChinburgHHS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/CheckowayMGFC0H16,
  author       = {Stephen Checkoway and
                  Jacob Maskiewicz and
                  Christina Garman and
                  Joshua Fried and
                  Shaanan Cohney and
                  Matthew Green and
                  Nadia Heninger and
                  Ralf{-}Philipp Weinmann and
                  Eric Rescorla and
                  Hovav Shacham},
  editor       = {Edgar R. Weippl and
                  Stefan Katzenbeisser and
                  Christopher Kruegel and
                  Andrew C. Myers and
                  Shai Halevi},
  title        = {A Systematic Analysis of the Juniper Dual {EC} Incident},
  booktitle    = {Proceedings of the 2016 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, Vienna, Austria, October 24-28, 2016},
  pages        = {468--479},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2976749.2978395},
  doi          = {10.1145/2976749.2978395},
  timestamp    = {Tue, 10 Nov 2020 20:00:49 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/CheckowayMGFC0H16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/YaromGH16,
  author       = {Yuval Yarom and
                  Daniel Genkin and
                  Nadia Heninger},
  editor       = {Benedikt Gierlichs and
                  Axel Y. Poschmann},
  title        = {CacheBleed: {A} Timing Attack on OpenSSL Constant Time {RSA}},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2016 - 18th International
                  Conference, Santa Barbara, CA, USA, August 17-19, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9813},
  pages        = {346--367},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53140-2\_17},
  doi          = {10.1007/978-3-662-53140-2\_17},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/YaromGH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/ValentaCLFBH16,
  author       = {Luke Valenta and
                  Shaanan Cohney and
                  Alex Liao and
                  Joshua Fried and
                  Satya Bodduluri and
                  Nadia Heninger},
  editor       = {Jens Grossklags and
                  Bart Preneel},
  title        = {Factoring as a Service},
  booktitle    = {Financial Cryptography and Data Security - 20th International Conference,
                  {FC} 2016, Christ Church, Barbados, February 22-26, 2016, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9603},
  pages        = {321--338},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-54970-4\_19},
  doi          = {10.1007/978-3-662-54970-4\_19},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/ValentaCLFBH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/imc/HastingsFH16,
  author       = {Marcella Hastings and
                  Joshua Fried and
                  Nadia Heninger},
  editor       = {Phillipa Gill and
                  John S. Heidemann and
                  John W. Byers and
                  Ramesh Govindan},
  title        = {Weak Keys Remain Widespread in Network Devices},
  booktitle    = {Proceedings of the 2016 {ACM} on Internet Measurement Conference,
                  {IMC} 2016, Santa Monica, CA, USA, November 14-16, 2016},
  pages        = {49--63},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {http://dl.acm.org/citation.cfm?id=2987486},
  timestamp    = {Tue, 06 Nov 2018 11:07:19 +0100},
  biburl       = {https://dblp.org/rec/conf/imc/HastingsFH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/AviramSSHDSVAHD16,
  author       = {Nimrod Aviram and
                  Sebastian Schinzel and
                  Juraj Somorovsky and
                  Nadia Heninger and
                  Maik Dankel and
                  Jens Steube and
                  Luke Valenta and
                  David Adrian and
                  J. Alex Halderman and
                  Viktor Dukhovni and
                  Emilia K{\"{a}}sper and
                  Shaanan Cohney and
                  Susanne Engels and
                  Christof Paar and
                  Yuval Shavitt},
  editor       = {Thorsten Holz and
                  Stefan Savage},
  title        = {{DROWN:} Breaking {TLS} Using SSLv2},
  booktitle    = {25th {USENIX} Security Symposium, {USENIX} Security 16, Austin, TX,
                  USA, August 10-12, 2016},
  pages        = {689--706},
  publisher    = {{USENIX} Association},
  year         = {2016},
  url          = {https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/aviram},
  timestamp    = {Mon, 01 Feb 2021 08:43:18 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/AviramSSHDSVAHD16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/ChinburgHHS16,
  author       = {Ted Chinburg and
                  Brett Hemenway and
                  Nadia Heninger and
                  Zachary Scherr},
  title        = {Cryptographic applications of capacity theory: On the optimality of
                  Coppersmith's method for univariate polynomials},
  journal      = {CoRR},
  volume       = {abs/1605.08065},
  year         = {2016},
  url          = {http://arxiv.org/abs/1605.08065},
  eprinttype    = {arXiv},
  eprint       = {1605.08065},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/ChinburgHHS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/FriedGHT16,
  author       = {Joshua Fried and
                  Pierrick Gaudry and
                  Nadia Heninger and
                  Emmanuel Thom{\'{e}}},
  title        = {A kilobit hidden {SNFS} discrete logarithm computation},
  journal      = {CoRR},
  volume       = {abs/1610.02874},
  year         = {2016},
  url          = {http://arxiv.org/abs/1610.02874},
  eprinttype    = {arXiv},
  eprint       = {1610.02874},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/FriedGHT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/YaromGH16,
  author       = {Yuval Yarom and
                  Daniel Genkin and
                  Nadia Heninger},
  title        = {CacheBleed: {A} Timing Attack on OpenSSL Constant Time {RSA}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {224},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/224},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/YaromGH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CheckowayCG0HMR16,
  author       = {Stephen Checkoway and
                  Shaanan Cohney and
                  Christina Garman and
                  Matthew Green and
                  Nadia Heninger and
                  Jacob Maskiewicz and
                  Eric Rescorla and
                  Hovav Shacham and
                  Ralf{-}Philipp Weinmann},
  title        = {A Systematic Analysis of the Juniper Dual {EC} Incident},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {376},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/376},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CheckowayCG0HMR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChinburgHHS16,
  author       = {Ted Chinburg and
                  Brett Hemenway and
                  Nadia Heninger and
                  Zachary Scherr},
  title        = {Cryptographic applications of capacity theory: On the optimality of
                  Coppersmith's method for univariate polynomials},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {869},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/869},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChinburgHHS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FriedGHT16,
  author       = {Joshua Fried and
                  Pierrick Gaudry and
                  Nadia Heninger and
                  Emmanuel Thom{\'{e}}},
  title        = {A kilobit hidden {SNFS} discrete logarithm computation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {961},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/961},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FriedGHT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ValentaASCFHHH16,
  author       = {Luke Valenta and
                  David Adrian and
                  Antonio Sanso and
                  Shaanan Cohney and
                  Joshua Fried and
                  Marcella Hastings and
                  J. Alex Halderman and
                  Nadia Heninger},
  title        = {Measuring small subgroup attacks against Diffie-Hellman},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {995},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/995},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ValentaASCFHHH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/amco/CohnH15,
  author       = {Henry Cohn and
                  Nadia Heninger},
  title        = {Ideal forms of Coppersmith's theorem and Guruswami-Sudan list decoding},
  journal      = {Adv. Math. Commun.},
  volume       = {9},
  number       = {3},
  pages        = {311--339},
  year         = {2015},
  url          = {https://doi.org/10.3934/amc.2015.9.311},
  doi          = {10.3934/AMC.2015.9.311},
  timestamp    = {Fri, 10 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/amco/CohnH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/AdrianBDGGHHSTV15,
  author       = {David Adrian and
                  Karthikeyan Bhargavan and
                  Zakir Durumeric and
                  Pierrick Gaudry and
                  Matthew Green and
                  J. Alex Halderman and
                  Nadia Heninger and
                  Drew Springall and
                  Emmanuel Thom{\'{e}} and
                  Luke Valenta and
                  Benjamin VanderSloot and
                  Eric Wustrow and
                  Santiago Zanella B{\'{e}}guelin and
                  Paul Zimmermann},
  editor       = {Indrajit Ray and
                  Ninghui Li and
                  Christopher Kruegel},
  title        = {Imperfect Forward Secrecy: How Diffie-Hellman Fails in Practice},
  booktitle    = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, Denver, CO, USA, October 12-16, 2015},
  pages        = {5--17},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2810103.2813707},
  doi          = {10.1145/2810103.2813707},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/AdrianBDGGHHSTV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ValentaCLFBH15,
  author       = {Luke Valenta and
                  Shaanan Cohney and
                  Alex Liao and
                  Joshua Fried and
                  Satya Bodduluri and
                  Nadia Heninger},
  title        = {Factoring as a Service},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1000},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1000},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ValentaCLFBH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/BosHHMNW14,
  author       = {Joppe W. Bos and
                  J. Alex Halderman and
                  Nadia Heninger and
                  Jonathan Moore and
                  Michael Naehrig and
                  Eric Wustrow},
  editor       = {Nicolas Christin and
                  Reihaneh Safavi{-}Naini},
  title        = {Elliptic Curve Cryptography in Practice},
  booktitle    = {Financial Cryptography and Data Security - 18th International Conference,
                  {FC} 2014, Christ Church, Barbados, March 3-7, 2014, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8437},
  pages        = {157--175},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-45472-5\_11},
  doi          = {10.1007/978-3-662-45472-5\_11},
  timestamp    = {Tue, 21 Mar 2023 20:59:40 +0100},
  biburl       = {https://dblp.org/rec/conf/fc/BosHHMNW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/BernsteinCCCHLS13,
  author       = {Daniel J. Bernstein and
                  Yun{-}An Chang and
                  Chen{-}Mou Cheng and
                  Li{-}Ping Chou and
                  Nadia Heninger and
                  Tanja Lange and
                  Nicko van Someren},
  editor       = {Kazue Sako and
                  Palash Sarkar},
  title        = {Factoring {RSA} Keys from Certified Smart Cards: Coppersmith in the
                  Wild},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2013 - 19th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Bengaluru, India, December 1-5, 2013, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8270},
  pages        = {341--360},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-42045-0\_18},
  doi          = {10.1007/978-3-642-42045-0\_18},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/BernsteinCCCHLS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BernsteinCCCHLS13,
  author       = {Daniel J. Bernstein and
                  Yun{-}An Chang and
                  Chen{-}Mou Cheng and
                  Li{-}Ping Chou and
                  Nadia Heninger and
                  Tanja Lange and
                  Nicko van Someren},
  title        = {Factoring {RSA} keys from certified smart cards: Coppersmith in the
                  wild},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {599},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/599},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BernsteinCCCHLS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BosHHMNW13,
  author       = {Joppe W. Bos and
                  J. Alex Halderman and
                  Nadia Heninger and
                  Jonathan Moore and
                  Michael Naehrig and
                  Eric Wustrow},
  title        = {Elliptic Curve Cryptography in Practice},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {734},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/734},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BosHHMNW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/HeningerDWH12,
  author       = {Nadia Heninger and
                  Zakir Durumeric and
                  Eric Wustrow and
                  J. Alex Halderman},
  editor       = {Tadayoshi Kohno},
  title        = {Mining Your Ps and Qs: Detection of Widespread Weak Keys in Network
                  Devices},
  booktitle    = {Proceedings of the 21th {USENIX} Security Symposium, Bellevue, WA,
                  USA, August 8-10, 2012},
  pages        = {205--220},
  publisher    = {{USENIX} Association},
  year         = {2012},
  url          = {https://www.usenix.org/conference/usenixsecurity12/technical-sessions/presentation/heninger},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/HeningerDWH12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/DevetGH12,
  author       = {Casey Devet and
                  Ian Goldberg and
                  Nadia Heninger},
  editor       = {Tadayoshi Kohno},
  title        = {Optimally Robust Private Information Retrieval},
  booktitle    = {Proceedings of the 21th {USENIX} Security Symposium, Bellevue, WA,
                  USA, August 8-10, 2012},
  pages        = {269--283},
  publisher    = {{USENIX} Association},
  year         = {2012},
  url          = {https://www.usenix.org/conference/usenixsecurity12/technical-sessions/presentation/devet},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/DevetGH12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wpes/GopalH12,
  author       = {Deepika Gopal and
                  Nadia Heninger},
  editor       = {Ting Yu and
                  Nikita Borisov},
  title        = {Torchestra: reducing interactive traffic delays over tor},
  booktitle    = {Proceedings of the 11th annual {ACM} Workshop on Privacy in the Electronic
                  Society, {WPES} 2012, Raleigh, NC, USA, October 15, 2012},
  pages        = {31--42},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2381966.2381972},
  doi          = {10.1145/2381966.2381972},
  timestamp    = {Tue, 12 Apr 2022 13:28:49 +0200},
  biburl       = {https://dblp.org/rec/conf/wpes/GopalH12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DevetGH12,
  author       = {Casey Devet and
                  Ian Goldberg and
                  Nadia Heninger},
  title        = {Optimally Robust Private Information Retrieval},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {83},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/083},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DevetGH12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/innovations/CohnH11,
  author       = {Henry Cohn and
                  Nadia Heninger},
  editor       = {Bernard Chazelle},
  title        = {Ideal forms of Coppersmith's theorem and Guruswami-Sudan list decoding},
  booktitle    = {Innovations in Computer Science - {ICS} 2011, Tsinghua University,
                  Beijing, China, January 7-9, 2011. Proceedings},
  pages        = {298--308},
  publisher    = {Tsinghua University Press},
  year         = {2011},
  url          = {http://conference.iiis.tsinghua.edu.cn/ICS2011/content/papers/9.html},
  timestamp    = {Mon, 23 Mar 2020 08:26:00 +0100},
  biburl       = {https://dblp.org/rec/conf/innovations/CohnH11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/Heninger11,
  author       = {Nadia Heninger},
  editor       = {Henk C. A. van Tilborg and
                  Sushil Jajodia},
  title        = {Cold-Boot Attacks},
  booktitle    = {Encyclopedia of Cryptography and Security, 2nd Ed},
  pages        = {216--217},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-1-4419-5906-5\_124},
  doi          = {10.1007/978-1-4419-5906-5\_124},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/Heninger11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1108-2714,
  author       = {Henry Cohn and
                  Nadia Heninger},
  title        = {Approximate common divisors via lattices},
  journal      = {CoRR},
  volume       = {abs/1108.2714},
  year         = {2011},
  url          = {http://arxiv.org/abs/1108.2714},
  eprinttype    = {arXiv},
  eprint       = {1108.2714},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1108-2714.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CohnH11,
  author       = {Henry Cohn and
                  Nadia Heninger},
  title        = {Approximate common divisors via lattices},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {437},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/437},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CohnH11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/WolchokHHFHRWW10,
  author       = {Scott Wolchok and
                  Owen S. Hofmann and
                  Nadia Heninger and
                  Edward W. Felten and
                  J. Alex Halderman and
                  Christopher J. Rossbach and
                  Brent Waters and
                  Emmett Witchel},
  title        = {Defeating Vanish with Low-Cost Sybil Attacks Against Large DHTs},
  booktitle    = {Proceedings of the Network and Distributed System Security Symposium,
                  {NDSS} 2010, San Diego, California, USA, 28th February - 3rd March
                  2010},
  publisher    = {The Internet Society},
  year         = {2010},
  url          = {https://www.ndss-symposium.org/ndss2010/defeating-vanish-low-cost-sybil-attacks-against-large-dhts},
  timestamp    = {Mon, 01 Feb 2021 08:42:17 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/WolchokHHFHRWW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/Heninger10,
  author       = {Nadia Heninger},
  editor       = {Douglas W. Jones and
                  Jean{-}Jacques Quisquater and
                  Eric Rescorla},
  title        = {Computational Complexity and Information Asymmetry in Election Audits
                  with Low-Entropy Randomness},
  booktitle    = {2010 Electronic Voting Technology Workshop / Workshop on Trustworthy
                  Elections, {EVT/WOTE} '10, Washington, D.C., USA, August 9-10, 2010},
  publisher    = {{USENIX} Association},
  year         = {2010},
  url          = {https://www.usenix.org/conference/evtwote-10/computational-complexity-and-information-asymmetry-election-audits-low-entropy},
  timestamp    = {Mon, 01 Feb 2021 08:43:18 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/Heninger10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1008-1284,
  author       = {Henry Cohn and
                  Nadia Heninger},
  title        = {Ideal forms of Coppersmith's theorem and Guruswami-Sudan list decoding},
  journal      = {CoRR},
  volume       = {abs/1008.1284},
  year         = {2010},
  url          = {http://arxiv.org/abs/1008.1284},
  eprinttype    = {arXiv},
  eprint       = {1008.1284},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1008-1284.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cacm/HaldermanSHCPCFAF09,
  author       = {J. Alex Halderman and
                  Seth D. Schoen and
                  Nadia Heninger and
                  William Clarkson and
                  William Paul and
                  Joseph A. Calandrino and
                  Ariel J. Feldman and
                  Jacob Appelbaum and
                  Edward W. Felten},
  title        = {Lest we remember: cold-boot attacks on encryption keys},
  journal      = {Commun. {ACM}},
  volume       = {52},
  number       = {5},
  pages        = {91--98},
  year         = {2009},
  url          = {https://doi.org/10.1145/1506409.1506429},
  doi          = {10.1145/1506409.1506429},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cacm/HaldermanSHCPCFAF09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/HeningerS09,
  author       = {Nadia Heninger and
                  Hovav Shacham},
  editor       = {Shai Halevi},
  title        = {Reconstructing {RSA} Private Keys from Random Key Bits},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2009, 29th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2009.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5677},
  pages        = {1--17},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03356-8\_1},
  doi          = {10.1007/978-3-642-03356-8\_1},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/HeningerS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/ClarksonWFHHF09,
  author       = {William Clarkson and
                  Tim Weyrich and
                  Adam Finkelstein and
                  Nadia Heninger and
                  J. Alex Halderman and
                  Edward W. Felten},
  title        = {Fingerprinting Blank Paper Using Commodity Scanners},
  booktitle    = {30th {IEEE} Symposium on Security and Privacy {(SP} 2009), 17-20 May
                  2009, Oakland, California, {USA}},
  pages        = {301--314},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/SP.2009.7},
  doi          = {10.1109/SP.2009.7},
  timestamp    = {Thu, 21 Sep 2023 16:14:16 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/ClarksonWFHHF09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/HaldermanSHCPCFAF08,
  author       = {J. Alex Halderman and
                  Seth D. Schoen and
                  Nadia Heninger and
                  William Clarkson and
                  William Paul and
                  Joseph A. Calandrino and
                  Ariel J. Feldman and
                  Jacob Appelbaum and
                  Edward W. Felten},
  editor       = {Paul C. van Oorschot},
  title        = {Lest We Remember: Cold Boot Attacks on Encryption Keys},
  booktitle    = {Proceedings of the 17th {USENIX} Security Symposium, July 28-August
                  1, 2008, San Jose, CA, {USA}},
  pages        = {45--60},
  publisher    = {{USENIX} Association},
  year         = {2008},
  url          = {http://www.usenix.org/events/sec08/tech/full\_papers/halderman/halderman.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/HaldermanSHCPCFAF08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HeningerS08,
  author       = {Nadia Heninger and
                  Hovav Shacham},
  title        = {Reconstructing {RSA} Private Keys from Random Key Bits},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {510},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/510},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HeningerS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jct/HeningerRS06,
  author       = {Nadia Heninger and
                  Eric M. Rains and
                  Neil J. A. Sloane},
  title        = {On the integrality of \emph{n}th roots of generating functions},
  journal      = {J. Comb. Theory, Ser. {A}},
  volume       = {113},
  number       = {8},
  pages        = {1732--1745},
  year         = {2006},
  url          = {https://doi.org/10.1016/j.jcta.2006.03.018},
  doi          = {10.1016/J.JCTA.2006.03.018},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jct/HeningerRS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics