Where did I leave my keys?: lessons from the Juniper Dual EC incident. | 1 | 0.37 | 2018 |
A Systematic Analysis of the Juniper Dual EC Incident. | 22 | 0.89 | 2016 |
Practical Cryptanalysis of ISO 9796-2 and EMV Signatures | 0 | 0.34 | 2016 |
Content and Popularity Analysis of Tor Hidden Services | 26 | 1.37 | 2013 |
Trawling for Tor Hidden Services: Detection, Measurement, Deanonymization | 54 | 2.49 | 2013 |
Torscan: Deanonymizing Connections Using Topology Leaks | 0 | 0.34 | 2012 |
Baseband Attacks: Remote Exploitation of Memory Corruptions in Cellular Protocol Stacks. | 0 | 0.34 | 2012 |
Baseband attacks: remote exploitation of memory corruptions in cellular protocol stacks | 17 | 1.22 | 2012 |
A Framework for Automated Architecture-Independent Gadget Search. | 0 | 0.34 | 2010 |
A framework for automated architecture-independent gadget search | 24 | 1.60 | 2010 |
Attacks on the DECT Authentication Mechanisms | 10 | 1.35 | 2009 |
Meet-in-the-Middle Attacks on SHA-3 Candidates | 10 | 0.66 | 2009 |
Practical Cryptanalysis of iso/iec 9796-2 and emv Signatures | 9 | 0.80 | 2009 |
Variants of Bleichenbacher's Low-Exponent Attack on PKCS#1 RSA Signatures | 2 | 0.41 | 2008 |
Breaking 104 Bit WEP in less than 60 seconds | 83 | 5.04 | 2007 |
Analysis of the SMS4 block cipher | 22 | 1.43 | 2007 |
A zero-dimensional gröbner basis for AES-128 | 11 | 0.63 | 2006 |
Block ciphers sensitive to gröbner basis attacks | 17 | 0.92 | 2006 |
Post-Quantum Signatures. | 0 | 0.34 | 2004 |