<--- Back to Details
First PageDocument Content
Cryptography / Turing Award laureates / Nadia Heninger / Whitfield Diffie / Association for Computing Machinery / Alex Halderman / Bitcoin / Elliptic-curve cryptography / Post-quantum cryptography / Heninger / Matthew D. Green / RSA
Date: 2017-09-13 09:12:51
Cryptography
Turing Award laureates
Nadia Heninger
Whitfield Diffie
Association for Computing Machinery
Alex Halderman
Bitcoin
Elliptic-curve cryptography
Post-quantum cryptography
Heninger
Matthew D. Green
RSA

LUKE T. VALENTA CONTACT INFORMATION http://lukevalenta.com

Add to Reading List

Source URL: www.seas.upenn.edu

Download Document from Source Website

File Size: 69,52 KB

Share Document on Facebook

Similar Documents

Computing / System software / Software / Internet privacy / Computer network security / Internet censorship in China / Echo Protocol / Deep packet inspection / Internet censorship / Nmap / Transmission Control Protocol / Discard Protocol

Quack: Scalable Remote Measurement of Application-Layer Censorship Benjamin VanderSloot, Allison McDonald, Will Scott, J. Alex Halderman, and Roya Ensafi University of Michigan {benvds, amcdon, willscott, jhalderm, ensaf

DocID: 1xVLP - View Document

Computing / System software / Software / Internet privacy / Computer network security / Internet censorship in China / Echo Protocol / Deep packet inspection / Internet censorship / Nmap / Transmission Control Protocol / Discard Protocol

Quack: Scalable Remote Measurement of Application-Layer Censorship Benjamin VanderSloot, Allison McDonald, Will Scott, J. Alex Halderman, and Roya Ensafi University of Michigan {benvds, amcdon, willscott, jhalderm, ensaf

DocID: 1xVIz - View Document

Cryptography / Algebra / Abstract algebra / Group theory / Computational hardness assumptions / DiffieHellman key exchange / Cyclic group / Logjam / Generating set of a group / Subgroup / Whitfield Diffie / Computational DiffieHellman assumption

Measuring small subgroup attacks against Diffie-Hellman Luke Valenta∗ , David Adrian† , Antonio Sanso‡ , Shaanan Cohney∗ , Joshua Fried∗ , Marcella Hastings∗ , J. Alex Halderman† , Nadia Heninger∗ ∗ Uni

DocID: 1xVhf - View Document

Computer security / Computing / Computer network security / Security engineering / Information and communications technology / Crime prevention / Cryptography / National security / Virtual private network / SCADA / FBI Criminal Justice Information Services Division / Computer network

A Security Analysis of Police Computer Systems Benjamin VanderSloot∗ Stuart Wheaton∗ J. Alex Halderman

DocID: 1xVf4 - View Document

Computer network security / Computing / Firewall software / Information and communications technology / Computer security / Data security / Internet censorship in China / Human rights in China / Firewall / Stateful firewall / Internet censorship / Router

Internet Censorship in China: Where Does the Filtering Occur? Xueyang Xu, Z. Morley Mao, and J. Alex Halderman Department of Computer Science and Engineering, University of Michigan, 2260 Hayward Street, Ann Arbor, MI 48

DocID: 1xV2b - View Document