Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Nadia Heninger
@inproceedings{DBLP:conf/africacrypt/RoweBH23, author = {Dylan Rowe and Joachim Breitner and Nadia Heninger}, editor = {Nadia El Mrabet and Luca De Feo and Sylvain Duquesne}, title = {The Curious Case of the Half-Half Bitcoin {ECDSA} Nonces}, booktitle = {Progress in Cryptology - {AFRICACRYPT} 2023 - 14th International Conference on Cryptology in Africa, Sousse, Tunisia, July 19-21, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14064}, pages = {273--284}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-37679-5\_12}, doi = {10.1007/978-3-031-37679-5\_12}, timestamp = {Fri, 21 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/africacrypt/RoweBH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/RyanHSH23, author = {Keegan Ryan and Kaiwen He and George Arnold Sullivan and Nadia Heninger}, editor = {Weizhi Meng and Christian Damsgaard Jensen and Cas Cremers and Engin Kirda}, title = {Passive {SSH} Key Compromise via Lattices}, booktitle = {Proceedings of the 2023 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2023, Copenhagen, Denmark, November 26-30, 2023}, pages = {2886--2900}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3576915.3616629}, doi = {10.1145/3576915.3616629}, timestamp = {Tue, 28 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/RyanHSH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/RyanH23, author = {Keegan Ryan and Nadia Heninger}, editor = {Helena Handschuh and Anna Lysyanskaya}, title = {Fast Practical Lattice Reduction Through Iterated Compression}, booktitle = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August 20-24, 2023, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {14083}, pages = {3--36}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-38548-3\_1}, doi = {10.1007/978-3-031-38548-3\_1}, timestamp = {Fri, 18 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/RyanH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/HeningerR23, author = {Nadia Heninger and Keegan Ryan}, editor = {Alexandra Boldyreva and Vladimir Kolesnikov}, title = {The Hidden Number Problem with Small Unknown Multipliers: Cryptanalyzing {MEGA} in Six Queries and Other Applications}, booktitle = {Public-Key Cryptography - {PKC} 2023 - 26th {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Atlanta, GA, USA, May 7-10, 2023, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {13940}, pages = {147--176}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-31368-4\_6}, doi = {10.1007/978-3-031-31368-4\_6}, timestamp = {Wed, 17 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/HeningerR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/RyanH23, author = {Keegan Ryan and Nadia Heninger}, title = {Fast Practical Lattice Reduction through Iterated Compression}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {237}, year = {2023}, url = {https://eprint.iacr.org/2023/237}, timestamp = {Tue, 28 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/RyanH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DavisGHRS23, author = {Hannah Davis and Matthew Green and Nadia Heninger and Keegan Ryan and Adam Suhl}, title = {On the Possibility of a Backdoor in the Micali-Schnorr Generator}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {440}, year = {2023}, url = {https://eprint.iacr.org/2023/440}, timestamp = {Fri, 31 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DavisGHRS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/RoweBH23, author = {Dylan Rowe and Joachim Breitner and Nadia Heninger}, title = {The curious case of the half-half Bitcoin {ECDSA} nonces}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {841}, year = {2023}, url = {https://eprint.iacr.org/2023/841}, timestamp = {Mon, 03 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/RoweBH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BeckEGHJ23, author = {Gabrielle Beck and Harry Eldridge and Matthew Green and Nadia Heninger and Abhishek Jain}, title = {Abuse-Resistant Location Tracking: Balancing Privacy and Safety in the Offline Finding Ecosystem}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1332}, year = {2023}, url = {https://eprint.iacr.org/2023/1332}, timestamp = {Sat, 07 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BeckEGHJ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/RyanHSH23, author = {Keegan Ryan and Kaiwen He and George Arnold Sullivan and Nadia Heninger}, title = {Passive {SSH} Key Compromise via Lattices}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1711}, year = {2023}, url = {https://eprint.iacr.org/2023/1711}, timestamp = {Thu, 09 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/RyanHSH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/BoudotGGHTZ22, author = {Fabrice Boudot and Pierrick Gaudry and Aurore Guillevic and Nadia Heninger and Emmanuel Thom{\'{e}} and Paul Zimmermann}, title = {The State of the Art in Integer Factoring and Breaking Public-Key Cryptography}, journal = {{IEEE} Secur. Priv.}, volume = {20}, number = {2}, pages = {80--86}, year = {2022}, url = {https://doi.org/10.1109/MSEC.2022.3141918}, doi = {10.1109/MSEC.2022.3141918}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/BoudotGGHTZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/SullivanSHW22, author = {George Arnold Sullivan and Jackson Sippe and Nadia Heninger and Eric Wustrow}, editor = {Kevin R. B. Butler and Kurt Thomas}, title = {Open to a fault: On the passive compromise of {TLS} keys via transient errors}, booktitle = {31st {USENIX} Security Symposium, {USENIX} Security 2022, Boston, MA, USA, August 10-12, 2022}, pages = {233--250}, publisher = {{USENIX} Association}, year = {2022}, url = {https://www.usenix.org/conference/usenixsecurity22/presentation/sullivan}, timestamp = {Tue, 18 Oct 2022 17:10:36 +0200}, biburl = {https://dblp.org/rec/conf/uss/SullivanSHW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Heninger22, author = {Nadia Heninger}, title = {RSA, DH, and {DSA} in the Wild}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {48}, year = {2022}, url = {https://eprint.iacr.org/2022/048}, timestamp = {Fri, 18 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/Heninger22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/RyanH22, author = {Keegan Ryan and Nadia Heninger}, title = {Cryptanalyzing {MEGA} in Six Queries}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {914}, year = {2022}, url = {https://eprint.iacr.org/2022/914}, timestamp = {Tue, 27 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/RyanH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/AlbrechtH21, author = {Martin R. Albrecht and Nadia Heninger}, editor = {Anne Canteaut and Fran{\c{c}}ois{-}Xavier Standaert}, title = {On Bounded Distance Decoding with Predicate: Breaking the "Lattice Barrier" for the Hidden Number Problem}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2021 - 40th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, October 17-21, 2021, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12696}, pages = {528--558}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-77870-5\_19}, doi = {10.1007/978-3-030-77870-5\_19}, timestamp = {Wed, 16 Jun 2021 11:49:32 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/AlbrechtH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/FalkHR20, author = {Brett Hemenway Falk and Nadia Heninger and Michael Rudow}, title = {Properties of constacyclic codes under the Schur product}, journal = {Des. Codes Cryptogr.}, volume = {88}, number = {6}, pages = {993--1021}, year = {2020}, url = {https://doi.org/10.1007/s10623-020-00720-3}, doi = {10.1007/S10623-020-00720-3}, timestamp = {Tue, 16 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/FalkHR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/MicheliHS20, author = {Gabrielle De Micheli and Nadia Heninger and Barak Shani}, title = {Characterizing overstretched {NTRU} attacks}, journal = {J. Math. Cryptol.}, volume = {14}, number = {1}, pages = {110--119}, year = {2020}, url = {https://doi.org/10.1515/jmc-2015-0055}, doi = {10.1515/JMC-2015-0055}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jmc/MicheliHS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BoudotGGHTZ20, author = {Fabrice Boudot and Pierrick Gaudry and Aurore Guillevic and Nadia Heninger and Emmanuel Thom{\'{e}} and Paul Zimmermann}, editor = {Daniele Micciancio and Thomas Ristenpart}, title = {Comparing the Difficulty of Factorization and Discrete Logarithm: {A} 240-Digit Experiment}, booktitle = {Advances in Cryptology - {CRYPTO} 2020 - 40th Annual International Cryptology Conference, {CRYPTO} 2020, Santa Barbara, CA, USA, August 17-21, 2020, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12171}, pages = {62--91}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-56880-1\_3}, doi = {10.1007/978-3-030-56880-1\_3}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BoudotGGHTZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/CohneyKPGHRY20, author = {Shaanan Cohney and Andrew Kwong and Shahar Paz and Daniel Genkin and Nadia Heninger and Eyal Ronen and Yuval Yarom}, title = {Pseudorandom Black Swans: Cache Attacks on CTR{\_}DRBG}, booktitle = {2020 {IEEE} Symposium on Security and Privacy, {SP} 2020, San Francisco, CA, USA, May 18-21, 2020}, pages = {1241--1258}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/SP40000.2020.00046}, doi = {10.1109/SP40000.2020.00046}, timestamp = {Thu, 21 Sep 2023 15:57:24 +0200}, biburl = {https://dblp.org/rec/conf/sp/CohneyKPGHRY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/MoghimiBHPS20, author = {Daniel Moghimi and Jo Van Bulck and Nadia Heninger and Frank Piessens and Berk Sunar}, editor = {Srdjan Capkun and Franziska Roesner}, title = {CopyCat: Controlled Instruction-Level Attacks on Enclaves}, booktitle = {29th {USENIX} Security Symposium, {USENIX} Security 2020, August 12-14, 2020}, pages = {469--486}, publisher = {{USENIX} Association}, year = {2020}, url = {https://www.usenix.org/conference/usenixsecurity20/presentation/moghimi-copycat}, timestamp = {Fri, 29 Jan 2021 22:08:55 +0100}, biburl = {https://dblp.org/rec/conf/uss/MoghimiBHPS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/MoghimiS0H20, author = {Daniel Moghimi and Berk Sunar and Thomas Eisenbarth and Nadia Heninger}, editor = {Srdjan Capkun and Franziska Roesner}, title = {{TPM-FAIL:} {TPM} meets Timing and Lattice Attacks}, booktitle = {29th {USENIX} Security Symposium, {USENIX} Security 2020, August 12-14, 2020}, pages = {2057--2073}, publisher = {{USENIX} Association}, year = {2020}, url = {https://www.usenix.org/conference/usenixsecurity20/presentation/moghimi-tpm}, timestamp = {Fri, 29 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/MoghimiS0H20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/fc/2020, editor = {Joseph Bonneau and Nadia Heninger}, title = {Financial Cryptography and Data Security - 24th International Conference, {FC} 2020, Kota Kinabalu, Malaysia, February 10-14, 2020 Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12059}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-51280-4}, doi = {10.1007/978-3-030-51280-4}, isbn = {978-3-030-51279-8}, timestamp = {Wed, 22 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/2020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2002-08437, author = {Daniel Moghimi and Jo Van Bulck and Nadia Heninger and Frank Piessens and Berk Sunar}, title = {CopyCat: Controlled Instruction-Level Attacks on Enclaves for Maximal Key Extraction}, journal = {CoRR}, volume = {abs/2002.08437}, year = {2020}, url = {https://arxiv.org/abs/2002.08437}, eprinttype = {arXiv}, eprint = {2002.08437}, timestamp = {Mon, 02 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2002-08437.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2006-06197, author = {Fabrice Boudot and Pierrick Gaudry and Aurore Guillevic and Nadia Heninger and Emmanuel Thom{\'{e}} and Paul Zimmermann}, title = {Comparing the difficulty of factorization and discrete logarithm: a 240-digit experiment}, journal = {CoRR}, volume = {abs/2006.06197}, year = {2020}, url = {https://arxiv.org/abs/2006.06197}, eprinttype = {arXiv}, eprint = {2006.06197}, timestamp = {Sat, 13 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2006-06197.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BoudotGGHTZ20, author = {Fabrice Boudot and Pierrick Gaudry and Aurore Guillevic and Nadia Heninger and Emmanuel Thom{\'{e}} and Paul Zimmermann}, title = {Comparing the difficulty of factorization and discrete logarithm: a 240-digit experiment}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {697}, year = {2020}, url = {https://eprint.iacr.org/2020/697}, timestamp = {Tue, 30 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BoudotGGHTZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MicheliH20, author = {Gabrielle De Micheli and Nadia Heninger}, title = {Recovering cryptographic keys from partial information, by example}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1506}, year = {2020}, url = {https://eprint.iacr.org/2020/1506}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/MicheliH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AlbrechtH20, author = {Martin R. Albrecht and Nadia Heninger}, title = {On Bounded Distance Decoding with Predicate: Breaking the "Lattice Barrier" for the Hidden Number Problem}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1540}, year = {2020}, url = {https://eprint.iacr.org/2020/1540}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/AlbrechtH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cacm/AdrianBDGGHHSTV19, author = {David Adrian and Karthikeyan Bhargavan and Zakir Durumeric and Pierrick Gaudry and Matthew Green and J. Alex Halderman and Nadia Heninger and Drew Springall and Emmanuel Thom{\'{e}} and Luke Valenta and Benjamin VanderSloot and Eric Wustrow and Santiago Zanella B{\'{e}}guelin and Paul Zimmermann}, title = {Imperfect forward secrecy: how Diffie-Hellman fails in practice}, journal = {Commun. {ACM}}, volume = {62}, number = {1}, pages = {106--114}, year = {2019}, url = {https://doi.org/10.1145/3292035}, doi = {10.1145/3292035}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cacm/AdrianBDGGHHSTV19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/BreitnerH19, author = {Joachim Breitner and Nadia Heninger}, editor = {Ian Goldberg and Tyler Moore}, title = {Biased Nonce Sense: Lattice Attacks Against Weak {ECDSA} Signatures in Cryptocurrencies}, booktitle = {Financial Cryptography and Data Security - 23rd International Conference, {FC} 2019, Frigate Bay, St. Kitts and Nevis, February 18-22, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11598}, pages = {3--20}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-32101-7\_1}, doi = {10.1007/978-3-030-32101-7\_1}, timestamp = {Wed, 12 Aug 2020 17:59:02 +0200}, biburl = {https://dblp.org/rec/conf/fc/BreitnerH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/HastingsHW19, author = {Marcella Hastings and Nadia Heninger and Eric Wustrow}, editor = {Ian Goldberg and Tyler Moore}, title = {Short Paper: The Proof is in the Pudding - Proofs of Work for Solving Discrete Logarithms}, booktitle = {Financial Cryptography and Data Security - 23rd International Conference, {FC} 2019, Frigate Bay, St. Kitts and Nevis, February 18-22, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11598}, pages = {396--404}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-32101-7\_24}, doi = {10.1007/978-3-030-32101-7\_24}, timestamp = {Mon, 14 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/HastingsHW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/uss/2019, editor = {Nadia Heninger and Patrick Traynor}, title = {28th {USENIX} Security Symposium, {USENIX} Security 2019, Santa Clara, CA, USA, August 14-16, 2019}, publisher = {{USENIX} Association}, year = {2019}, url = {https://www.usenix.org/conference/usenixsecurity19}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/2019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1911-05673, author = {Daniel Moghimi and Berk Sunar and Thomas Eisenbarth and Nadia Heninger}, title = {{TPM-FAIL:} {TPM} meets Timing and Lattice Attacks}, journal = {CoRR}, volume = {abs/1911.05673}, year = {2019}, url = {http://arxiv.org/abs/1911.05673}, eprinttype = {arXiv}, eprint = {1911.05673}, timestamp = {Mon, 02 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1911-05673.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BreitnerH19, author = {Joachim Breitner and Nadia Heninger}, title = {Biased Nonce Sense: Lattice Attacks against Weak {ECDSA} Signatures in Cryptocurrencies}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {23}, year = {2019}, url = {https://eprint.iacr.org/2019/023}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BreitnerH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CohneyKPGHRY19, author = {Shaanan Cohney and Andrew Kwong and Shahar Paz and Daniel Genkin and Nadia Heninger and Eyal Ronen and Yuval Yarom}, title = {Pseudorandom Black Swans: Cache Attacks on CTR{\_}DRBG}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {996}, year = {2019}, url = {https://eprint.iacr.org/2019/996}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CohneyKPGHRY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cacm/CheckowayMGFCGH18, author = {Stephen Checkoway and Jacob Maskiewicz and Christina Garman and Joshua Fried and Shaanan Cohney and Matthew Green and Nadia Heninger and Ralf{-}Philipp Weinmann and Eric Rescorla and Hovav Shacham}, title = {Where did {I} leave my keys?: lessons from the Juniper Dual {EC} incident}, journal = {Commun. {ACM}}, volume = {61}, number = {11}, pages = {148--155}, year = {2018}, url = {https://doi.org/10.1145/3266291}, doi = {10.1145/3266291}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cacm/CheckowayMGFCGH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/DallMEGHMY18, author = {Fergus Dall and Gabrielle De Micheli and Thomas Eisenbarth and Daniel Genkin and Nadia Heninger and Ahmad Moghimi and Yuval Yarom}, title = {CacheQuote: Efficiently Recovering Long-term Secrets of {SGX} {EPID} via Cache Attacks}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2018}, number = {2}, pages = {171--191}, year = {2018}, url = {https://doi.org/10.13154/tches.v2018.i2.171-191}, doi = {10.13154/TCHES.V2018.I2.171-191}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tches/DallMEGHMY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/CohneyGH18, author = {Shaanan N. Cohney and Matthew D. Green and Nadia Heninger}, editor = {David Lie and Mohammad Mannan and Michael Backes and XiaoFeng Wang}, title = {Practical State Recovery Attacks against Legacy {RNG} Implementations}, booktitle = {Proceedings of the 2018 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2018, Toronto, ON, Canada, October 15-19, 2018}, pages = {265--280}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3243734.3243756}, doi = {10.1145/3243734.3243756}, timestamp = {Tue, 10 Nov 2020 20:00:51 +0100}, biburl = {https://dblp.org/rec/conf/ccs/CohneyGH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurosp/ValentaSSH18, author = {Luke Valenta and Nick Sullivan and Antonio Sanso and Nadia Heninger}, title = {In Search of CurveSwap: Measuring Elliptic Curve Implementations in the Wild}, booktitle = {2018 {IEEE} European Symposium on Security and Privacy, EuroS{\&}P 2018, London, United Kingdom, April 24-26, 2018}, pages = {384--398}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/EuroSP.2018.00034}, doi = {10.1109/EUROSP.2018.00034}, timestamp = {Wed, 16 Oct 2019 14:14:55 +0200}, biburl = {https://dblp.org/rec/conf/eurosp/ValentaSSH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1810-07630, author = {Brett Hemenway Falk and Nadia Heninger and Michael Rudow}, title = {Properties of Constacyclic Codes Under the Schur Product}, journal = {CoRR}, volume = {abs/1810.07630}, year = {2018}, url = {http://arxiv.org/abs/1810.07630}, eprinttype = {arXiv}, eprint = {1810.07630}, timestamp = {Tue, 30 Oct 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1810-07630.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ValentaSSH18, author = {Luke Valenta and Nick Sullivan and Antonio Sanso and Nadia Heninger}, title = {In search of CurveSwap: Measuring elliptic curve implementations in the wild}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {298}, year = {2018}, url = {https://eprint.iacr.org/2018/298}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ValentaSSH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MicheliHS18, author = {Gabrielle De Micheli and Nadia Heninger and Barak Shani}, title = {Characterizing overstretched {NTRU} attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {630}, year = {2018}, url = {https://eprint.iacr.org/2018/630}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MicheliHS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HastingsHW18, author = {Marcella Hastings and Nadia Heninger and Eric Wustrow}, title = {The Proof is in the Pudding: Proofs of Work for Solving Discrete Logarithms}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {939}, year = {2018}, url = {https://eprint.iacr.org/2018/939}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HastingsHW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/YaromGH17, author = {Yuval Yarom and Daniel Genkin and Nadia Heninger}, title = {CacheBleed: a timing attack on OpenSSL constant-time {RSA}}, journal = {J. Cryptogr. Eng.}, volume = {7}, number = {2}, pages = {99--112}, year = {2017}, url = {https://doi.org/10.1007/s13389-017-0152-y}, doi = {10.1007/S13389-017-0152-Y}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/YaromGH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/BernsteinBGBHLV17, author = {Daniel J. Bernstein and Joachim Breitner and Daniel Genkin and Leon Groot Bruinderink and Nadia Heninger and Tanja Lange and Christine van Vredendaal and Yuval Yarom}, editor = {Wieland Fischer and Naofumi Homma}, title = {Sliding Right into Disaster: Left-to-Right Sliding Windows Leak}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2017 - 19th International Conference, Taipei, Taiwan, September 25-28, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10529}, pages = {555--576}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-66787-4\_27}, doi = {10.1007/978-3-319-66787-4\_27}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/BernsteinBGBHLV17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/FriedGHT17, author = {Joshua Fried and Pierrick Gaudry and Nadia Heninger and Emmanuel Thom{\'{e}}}, editor = {Jean{-}S{\'{e}}bastien Coron and Jesper Buus Nielsen}, title = {A Kilobit Hidden {SNFS} Discrete Logarithm Computation}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 - May 4, 2017, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10210}, pages = {202--231}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-56620-7\_8}, doi = {10.1007/978-3-319-56620-7\_8}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/FriedGHT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/ValentaASCFHHH17, author = {Luke Valenta and David Adrian and Antonio Sanso and Shaanan Cohney and Joshua Fried and Marcella Hastings and J. Alex Halderman and Nadia Heninger}, title = {Measuring small subgroup attacks against Diffie-Hellman}, booktitle = {24th Annual Network and Distributed System Security Symposium, {NDSS} 2017, San Diego, California, USA, February 26 - March 1, 2017}, publisher = {The Internet Society}, year = {2017}, url = {https://www.ndss-symposium.org/ndss2017/ndss-2017-programme/measuring-small-subgroup-attacks-against-diffie-hellman/}, timestamp = {Mon, 01 Feb 2021 08:42:15 +0100}, biburl = {https://dblp.org/rec/conf/ndss/ValentaASCFHHH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pqcrypto/BernsteinHLV17, author = {Daniel J. Bernstein and Nadia Heninger and Paul Lou and Luke Valenta}, editor = {Tanja Lange and Tsuyoshi Takagi}, title = {Post-quantum {RSA}}, booktitle = {Post-Quantum Cryptography - 8th International Workshop, PQCrypto 2017, Utrecht, The Netherlands, June 26-28, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10346}, pages = {311--329}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-59879-6\_18}, doi = {10.1007/978-3-319-59879-6\_18}, timestamp = {Tue, 14 May 2019 10:00:42 +0200}, biburl = {https://dblp.org/rec/conf/pqcrypto/BernsteinHLV17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BernsteinHLV17, author = {Daniel J. Bernstein and Nadia Heninger and Paul Lou and Luke Valenta}, title = {Post-quantum {RSA}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {351}, year = {2017}, url = {http://eprint.iacr.org/2017/351}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BernsteinHLV17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BernsteinBGBHLV17, author = {Daniel J. Bernstein and Joachim Breitner and Daniel Genkin and Leon Groot Bruinderink and Nadia Heninger and Tanja Lange and Christine van Vredendaal and Yuval Yarom}, title = {Sliding right into disaster: Left-to-right sliding windows leak}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {627}, year = {2017}, url = {http://eprint.iacr.org/2017/627}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BernsteinBGBHLV17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/ChinburgHHS16, author = {Ted Chinburg and Brett Hemenway and Nadia Heninger and Zachary Scherr}, editor = {Jung Hee Cheon and Tsuyoshi Takagi}, title = {Cryptographic Applications of Capacity Theory: On the Optimality of Coppersmith's Method for Univariate Polynomials}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2016 - 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10031}, pages = {759--788}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53887-6\_28}, doi = {10.1007/978-3-662-53887-6\_28}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/ChinburgHHS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/CheckowayMGFC0H16, author = {Stephen Checkoway and Jacob Maskiewicz and Christina Garman and Joshua Fried and Shaanan Cohney and Matthew Green and Nadia Heninger and Ralf{-}Philipp Weinmann and Eric Rescorla and Hovav Shacham}, editor = {Edgar R. Weippl and Stefan Katzenbeisser and Christopher Kruegel and Andrew C. Myers and Shai Halevi}, title = {A Systematic Analysis of the Juniper Dual {EC} Incident}, booktitle = {Proceedings of the 2016 {ACM} {SIGSAC} Conference on Computer and Communications Security, Vienna, Austria, October 24-28, 2016}, pages = {468--479}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2976749.2978395}, doi = {10.1145/2976749.2978395}, timestamp = {Tue, 10 Nov 2020 20:00:49 +0100}, biburl = {https://dblp.org/rec/conf/ccs/CheckowayMGFC0H16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/YaromGH16, author = {Yuval Yarom and Daniel Genkin and Nadia Heninger}, editor = {Benedikt Gierlichs and Axel Y. Poschmann}, title = {CacheBleed: {A} Timing Attack on OpenSSL Constant Time {RSA}}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2016 - 18th International Conference, Santa Barbara, CA, USA, August 17-19, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9813}, pages = {346--367}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53140-2\_17}, doi = {10.1007/978-3-662-53140-2\_17}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/ches/YaromGH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/ValentaCLFBH16, author = {Luke Valenta and Shaanan Cohney and Alex Liao and Joshua Fried and Satya Bodduluri and Nadia Heninger}, editor = {Jens Grossklags and Bart Preneel}, title = {Factoring as a Service}, booktitle = {Financial Cryptography and Data Security - 20th International Conference, {FC} 2016, Christ Church, Barbados, February 22-26, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9603}, pages = {321--338}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-54970-4\_19}, doi = {10.1007/978-3-662-54970-4\_19}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/ValentaCLFBH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/imc/HastingsFH16, author = {Marcella Hastings and Joshua Fried and Nadia Heninger}, editor = {Phillipa Gill and John S. Heidemann and John W. Byers and Ramesh Govindan}, title = {Weak Keys Remain Widespread in Network Devices}, booktitle = {Proceedings of the 2016 {ACM} on Internet Measurement Conference, {IMC} 2016, Santa Monica, CA, USA, November 14-16, 2016}, pages = {49--63}, publisher = {{ACM}}, year = {2016}, url = {http://dl.acm.org/citation.cfm?id=2987486}, timestamp = {Tue, 06 Nov 2018 11:07:19 +0100}, biburl = {https://dblp.org/rec/conf/imc/HastingsFH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/AviramSSHDSVAHD16, author = {Nimrod Aviram and Sebastian Schinzel and Juraj Somorovsky and Nadia Heninger and Maik Dankel and Jens Steube and Luke Valenta and David Adrian and J. Alex Halderman and Viktor Dukhovni and Emilia K{\"{a}}sper and Shaanan Cohney and Susanne Engels and Christof Paar and Yuval Shavitt}, editor = {Thorsten Holz and Stefan Savage}, title = {{DROWN:} Breaking {TLS} Using SSLv2}, booktitle = {25th {USENIX} Security Symposium, {USENIX} Security 16, Austin, TX, USA, August 10-12, 2016}, pages = {689--706}, publisher = {{USENIX} Association}, year = {2016}, url = {https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/aviram}, timestamp = {Mon, 01 Feb 2021 08:43:18 +0100}, biburl = {https://dblp.org/rec/conf/uss/AviramSSHDSVAHD16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/ChinburgHHS16, author = {Ted Chinburg and Brett Hemenway and Nadia Heninger and Zachary Scherr}, title = {Cryptographic applications of capacity theory: On the optimality of Coppersmith's method for univariate polynomials}, journal = {CoRR}, volume = {abs/1605.08065}, year = {2016}, url = {http://arxiv.org/abs/1605.08065}, eprinttype = {arXiv}, eprint = {1605.08065}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/ChinburgHHS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/FriedGHT16, author = {Joshua Fried and Pierrick Gaudry and Nadia Heninger and Emmanuel Thom{\'{e}}}, title = {A kilobit hidden {SNFS} discrete logarithm computation}, journal = {CoRR}, volume = {abs/1610.02874}, year = {2016}, url = {http://arxiv.org/abs/1610.02874}, eprinttype = {arXiv}, eprint = {1610.02874}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/FriedGHT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/YaromGH16, author = {Yuval Yarom and Daniel Genkin and Nadia Heninger}, title = {CacheBleed: {A} Timing Attack on OpenSSL Constant Time {RSA}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {224}, year = {2016}, url = {http://eprint.iacr.org/2016/224}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/YaromGH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CheckowayCG0HMR16, author = {Stephen Checkoway and Shaanan Cohney and Christina Garman and Matthew Green and Nadia Heninger and Jacob Maskiewicz and Eric Rescorla and Hovav Shacham and Ralf{-}Philipp Weinmann}, title = {A Systematic Analysis of the Juniper Dual {EC} Incident}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {376}, year = {2016}, url = {http://eprint.iacr.org/2016/376}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CheckowayCG0HMR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChinburgHHS16, author = {Ted Chinburg and Brett Hemenway and Nadia Heninger and Zachary Scherr}, title = {Cryptographic applications of capacity theory: On the optimality of Coppersmith's method for univariate polynomials}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {869}, year = {2016}, url = {http://eprint.iacr.org/2016/869}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChinburgHHS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FriedGHT16, author = {Joshua Fried and Pierrick Gaudry and Nadia Heninger and Emmanuel Thom{\'{e}}}, title = {A kilobit hidden {SNFS} discrete logarithm computation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {961}, year = {2016}, url = {http://eprint.iacr.org/2016/961}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FriedGHT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ValentaASCFHHH16, author = {Luke Valenta and David Adrian and Antonio Sanso and Shaanan Cohney and Joshua Fried and Marcella Hastings and J. Alex Halderman and Nadia Heninger}, title = {Measuring small subgroup attacks against Diffie-Hellman}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {995}, year = {2016}, url = {http://eprint.iacr.org/2016/995}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ValentaASCFHHH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/amco/CohnH15, author = {Henry Cohn and Nadia Heninger}, title = {Ideal forms of Coppersmith's theorem and Guruswami-Sudan list decoding}, journal = {Adv. Math. Commun.}, volume = {9}, number = {3}, pages = {311--339}, year = {2015}, url = {https://doi.org/10.3934/amc.2015.9.311}, doi = {10.3934/AMC.2015.9.311}, timestamp = {Fri, 10 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/amco/CohnH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/AdrianBDGGHHSTV15, author = {David Adrian and Karthikeyan Bhargavan and Zakir Durumeric and Pierrick Gaudry and Matthew Green and J. Alex Halderman and Nadia Heninger and Drew Springall and Emmanuel Thom{\'{e}} and Luke Valenta and Benjamin VanderSloot and Eric Wustrow and Santiago Zanella B{\'{e}}guelin and Paul Zimmermann}, editor = {Indrajit Ray and Ninghui Li and Christopher Kruegel}, title = {Imperfect Forward Secrecy: How Diffie-Hellman Fails in Practice}, booktitle = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015}, pages = {5--17}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2810103.2813707}, doi = {10.1145/2810103.2813707}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/AdrianBDGGHHSTV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ValentaCLFBH15, author = {Luke Valenta and Shaanan Cohney and Alex Liao and Joshua Fried and Satya Bodduluri and Nadia Heninger}, title = {Factoring as a Service}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1000}, year = {2015}, url = {http://eprint.iacr.org/2015/1000}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ValentaCLFBH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/BosHHMNW14, author = {Joppe W. Bos and J. Alex Halderman and Nadia Heninger and Jonathan Moore and Michael Naehrig and Eric Wustrow}, editor = {Nicolas Christin and Reihaneh Safavi{-}Naini}, title = {Elliptic Curve Cryptography in Practice}, booktitle = {Financial Cryptography and Data Security - 18th International Conference, {FC} 2014, Christ Church, Barbados, March 3-7, 2014, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8437}, pages = {157--175}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-45472-5\_11}, doi = {10.1007/978-3-662-45472-5\_11}, timestamp = {Tue, 21 Mar 2023 20:59:40 +0100}, biburl = {https://dblp.org/rec/conf/fc/BosHHMNW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/BernsteinCCCHLS13, author = {Daniel J. Bernstein and Yun{-}An Chang and Chen{-}Mou Cheng and Li{-}Ping Chou and Nadia Heninger and Tanja Lange and Nicko van Someren}, editor = {Kazue Sako and Palash Sarkar}, title = {Factoring {RSA} Keys from Certified Smart Cards: Coppersmith in the Wild}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2013 - 19th International Conference on the Theory and Application of Cryptology and Information Security, Bengaluru, India, December 1-5, 2013, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {8270}, pages = {341--360}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-42045-0\_18}, doi = {10.1007/978-3-642-42045-0\_18}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/BernsteinCCCHLS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BernsteinCCCHLS13, author = {Daniel J. Bernstein and Yun{-}An Chang and Chen{-}Mou Cheng and Li{-}Ping Chou and Nadia Heninger and Tanja Lange and Nicko van Someren}, title = {Factoring {RSA} keys from certified smart cards: Coppersmith in the wild}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {599}, year = {2013}, url = {http://eprint.iacr.org/2013/599}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BernsteinCCCHLS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BosHHMNW13, author = {Joppe W. Bos and J. Alex Halderman and Nadia Heninger and Jonathan Moore and Michael Naehrig and Eric Wustrow}, title = {Elliptic Curve Cryptography in Practice}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {734}, year = {2013}, url = {http://eprint.iacr.org/2013/734}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BosHHMNW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/HeningerDWH12, author = {Nadia Heninger and Zakir Durumeric and Eric Wustrow and J. Alex Halderman}, editor = {Tadayoshi Kohno}, title = {Mining Your Ps and Qs: Detection of Widespread Weak Keys in Network Devices}, booktitle = {Proceedings of the 21th {USENIX} Security Symposium, Bellevue, WA, USA, August 8-10, 2012}, pages = {205--220}, publisher = {{USENIX} Association}, year = {2012}, url = {https://www.usenix.org/conference/usenixsecurity12/technical-sessions/presentation/heninger}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/HeningerDWH12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/DevetGH12, author = {Casey Devet and Ian Goldberg and Nadia Heninger}, editor = {Tadayoshi Kohno}, title = {Optimally Robust Private Information Retrieval}, booktitle = {Proceedings of the 21th {USENIX} Security Symposium, Bellevue, WA, USA, August 8-10, 2012}, pages = {269--283}, publisher = {{USENIX} Association}, year = {2012}, url = {https://www.usenix.org/conference/usenixsecurity12/technical-sessions/presentation/devet}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/DevetGH12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wpes/GopalH12, author = {Deepika Gopal and Nadia Heninger}, editor = {Ting Yu and Nikita Borisov}, title = {Torchestra: reducing interactive traffic delays over tor}, booktitle = {Proceedings of the 11th annual {ACM} Workshop on Privacy in the Electronic Society, {WPES} 2012, Raleigh, NC, USA, October 15, 2012}, pages = {31--42}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2381966.2381972}, doi = {10.1145/2381966.2381972}, timestamp = {Tue, 12 Apr 2022 13:28:49 +0200}, biburl = {https://dblp.org/rec/conf/wpes/GopalH12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DevetGH12, author = {Casey Devet and Ian Goldberg and Nadia Heninger}, title = {Optimally Robust Private Information Retrieval}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {83}, year = {2012}, url = {http://eprint.iacr.org/2012/083}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DevetGH12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/innovations/CohnH11, author = {Henry Cohn and Nadia Heninger}, editor = {Bernard Chazelle}, title = {Ideal forms of Coppersmith's theorem and Guruswami-Sudan list decoding}, booktitle = {Innovations in Computer Science - {ICS} 2011, Tsinghua University, Beijing, China, January 7-9, 2011. Proceedings}, pages = {298--308}, publisher = {Tsinghua University Press}, year = {2011}, url = {http://conference.iiis.tsinghua.edu.cn/ICS2011/content/papers/9.html}, timestamp = {Mon, 23 Mar 2020 08:26:00 +0100}, biburl = {https://dblp.org/rec/conf/innovations/CohnH11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/Heninger11, author = {Nadia Heninger}, editor = {Henk C. A. van Tilborg and Sushil Jajodia}, title = {Cold-Boot Attacks}, booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed}, pages = {216--217}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-1-4419-5906-5\_124}, doi = {10.1007/978-1-4419-5906-5\_124}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/Heninger11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1108-2714, author = {Henry Cohn and Nadia Heninger}, title = {Approximate common divisors via lattices}, journal = {CoRR}, volume = {abs/1108.2714}, year = {2011}, url = {http://arxiv.org/abs/1108.2714}, eprinttype = {arXiv}, eprint = {1108.2714}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1108-2714.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CohnH11, author = {Henry Cohn and Nadia Heninger}, title = {Approximate common divisors via lattices}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {437}, year = {2011}, url = {http://eprint.iacr.org/2011/437}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CohnH11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/WolchokHHFHRWW10, author = {Scott Wolchok and Owen S. Hofmann and Nadia Heninger and Edward W. Felten and J. Alex Halderman and Christopher J. Rossbach and Brent Waters and Emmett Witchel}, title = {Defeating Vanish with Low-Cost Sybil Attacks Against Large DHTs}, booktitle = {Proceedings of the Network and Distributed System Security Symposium, {NDSS} 2010, San Diego, California, USA, 28th February - 3rd March 2010}, publisher = {The Internet Society}, year = {2010}, url = {https://www.ndss-symposium.org/ndss2010/defeating-vanish-low-cost-sybil-attacks-against-large-dhts}, timestamp = {Mon, 01 Feb 2021 08:42:17 +0100}, biburl = {https://dblp.org/rec/conf/ndss/WolchokHHFHRWW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/Heninger10, author = {Nadia Heninger}, editor = {Douglas W. Jones and Jean{-}Jacques Quisquater and Eric Rescorla}, title = {Computational Complexity and Information Asymmetry in Election Audits with Low-Entropy Randomness}, booktitle = {2010 Electronic Voting Technology Workshop / Workshop on Trustworthy Elections, {EVT/WOTE} '10, Washington, D.C., USA, August 9-10, 2010}, publisher = {{USENIX} Association}, year = {2010}, url = {https://www.usenix.org/conference/evtwote-10/computational-complexity-and-information-asymmetry-election-audits-low-entropy}, timestamp = {Mon, 01 Feb 2021 08:43:18 +0100}, biburl = {https://dblp.org/rec/conf/uss/Heninger10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1008-1284, author = {Henry Cohn and Nadia Heninger}, title = {Ideal forms of Coppersmith's theorem and Guruswami-Sudan list decoding}, journal = {CoRR}, volume = {abs/1008.1284}, year = {2010}, url = {http://arxiv.org/abs/1008.1284}, eprinttype = {arXiv}, eprint = {1008.1284}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1008-1284.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cacm/HaldermanSHCPCFAF09, author = {J. Alex Halderman and Seth D. Schoen and Nadia Heninger and William Clarkson and William Paul and Joseph A. Calandrino and Ariel J. Feldman and Jacob Appelbaum and Edward W. Felten}, title = {Lest we remember: cold-boot attacks on encryption keys}, journal = {Commun. {ACM}}, volume = {52}, number = {5}, pages = {91--98}, year = {2009}, url = {https://doi.org/10.1145/1506409.1506429}, doi = {10.1145/1506409.1506429}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cacm/HaldermanSHCPCFAF09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/HeningerS09, author = {Nadia Heninger and Hovav Shacham}, editor = {Shai Halevi}, title = {Reconstructing {RSA} Private Keys from Random Key Bits}, booktitle = {Advances in Cryptology - {CRYPTO} 2009, 29th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5677}, pages = {1--17}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-03356-8\_1}, doi = {10.1007/978-3-642-03356-8\_1}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/HeningerS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/ClarksonWFHHF09, author = {William Clarkson and Tim Weyrich and Adam Finkelstein and Nadia Heninger and J. Alex Halderman and Edward W. Felten}, title = {Fingerprinting Blank Paper Using Commodity Scanners}, booktitle = {30th {IEEE} Symposium on Security and Privacy {(SP} 2009), 17-20 May 2009, Oakland, California, {USA}}, pages = {301--314}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/SP.2009.7}, doi = {10.1109/SP.2009.7}, timestamp = {Thu, 21 Sep 2023 16:14:16 +0200}, biburl = {https://dblp.org/rec/conf/sp/ClarksonWFHHF09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/HaldermanSHCPCFAF08, author = {J. Alex Halderman and Seth D. Schoen and Nadia Heninger and William Clarkson and William Paul and Joseph A. Calandrino and Ariel J. Feldman and Jacob Appelbaum and Edward W. Felten}, editor = {Paul C. van Oorschot}, title = {Lest We Remember: Cold Boot Attacks on Encryption Keys}, booktitle = {Proceedings of the 17th {USENIX} Security Symposium, July 28-August 1, 2008, San Jose, CA, {USA}}, pages = {45--60}, publisher = {{USENIX} Association}, year = {2008}, url = {http://www.usenix.org/events/sec08/tech/full\_papers/halderman/halderman.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/HaldermanSHCPCFAF08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HeningerS08, author = {Nadia Heninger and Hovav Shacham}, title = {Reconstructing {RSA} Private Keys from Random Key Bits}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {510}, year = {2008}, url = {http://eprint.iacr.org/2008/510}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HeningerS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jct/HeningerRS06, author = {Nadia Heninger and Eric M. Rains and Neil J. A. Sloane}, title = {On the integrality of \emph{n}th roots of generating functions}, journal = {J. Comb. Theory, Ser. {A}}, volume = {113}, number = {8}, pages = {1732--1745}, year = {2006}, url = {https://doi.org/10.1016/j.jcta.2006.03.018}, doi = {10.1016/J.JCTA.2006.03.018}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jct/HeningerRS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.