Heninger

Results: 29



#Item
1Cryptography / Algebra / Abstract algebra / Group theory / Computational hardness assumptions / DiffieHellman key exchange / Cyclic group / Logjam / Generating set of a group / Subgroup / Whitfield Diffie / Computational DiffieHellman assumption

Measuring small subgroup attacks against Diffie-Hellman Luke Valenta∗ , David Adrian† , Antonio Sanso‡ , Shaanan Cohney∗ , Joshua Fried∗ , Marcella Hastings∗ , J. Alex Halderman† , Nadia Heninger∗ ∗ Uni

Add to Reading List

Source URL: www.seas.upenn.edu

Language: English - Date: 2017-09-13 08:39:05
2Algebra / Abstract algebra / Mathematics / Lie groups / Post-quantum cryptography / Algebraic structures / Lattice-based cryptography / Analytic geometry / Lattice / Field extension / Ring / Order

Characterizing overstretched NTRU attacks Gabrielle De Micheli, Nadia Heninger and Barak Shani University of Pennsylvania Abstract Overstretched NTRU, an NTRU variant with a large modulus, has been used as a building

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2018-06-25 14:23:34
3Cryptography / Elliptic curve cryptography / Elliptic-curve DiffieHellman / DiffieHellman key exchange / Cryptographic protocols / Alice and Bob / Computational hardness assumptions / Transport Layer Security / WolfSSH

In search of CurveSwap: Measuring elliptic curve implementations in the wild Luke Valenta∗ , Nick Sullivan† , Antonio Sanso‡ , Nadia Heninger∗ ∗ University

Add to Reading List

Source URL: www.seas.upenn.edu

Language: English - Date: 2018-07-31 15:14:59
4Algebra / Mathematics / Quadratic forms / Lattice points / Abstract algebra / Modular form / Leech lattice / E8 lattice / Lattice / Modular lattice / Unimodular lattice

arXiv:math/0509316v4 [math.NT] 8 AprOn the Integrality of nth Roots of Generating Functions Nadia Heninger(1) Computer Science Department Princeton University

Add to Reading List

Source URL: arxiv.org

Language: English - Date: 2013-10-10 07:34:34
5

In search of CurveSwap: Measuring elliptic curve implementations in the wild Luke Valenta∗ , Nick Sullivan† , Antonio Sanso‡ , Nadia Heninger∗ ∗ University of Pennsylvania, † Cloudflare, Inc., ‡ Adobe Syste

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2018-03-29 18:22:30
    6

    Weak Keys Remain Widespread in Network Devices Marcella Hastings Joshua Fried Nadia Heninger

    Add to Reading List

    Source URL: www.cis.upenn.edu

    - Date: 2017-01-10 09:33:37
      7

      A Systematic Analysis of the Juniper Dual EC Incident Stephen Checkoway*, Shaanan Cohney** , Christina Garman† Matthew Green†, Nadia Heninger** , ††

      Add to Reading List

      Source URL: eprint.iacr.org

      - Date: 2016-04-14 04:25:54
        8

        Measuring small subgroup attacks against Diffie-Hellman Luke Valenta∗ , David Adrian† , Antonio Sanso‡ , Shaanan Cohney∗ , Joshua Fried∗ , Marcella Hastings∗ , J. Alex Halderman† , Nadia Heninger∗ ∗ Uni

        Add to Reading List

        Source URL: eprint.iacr.org

        - Date: 2016-10-23 23:14:23
          9

          Imperfect Forward Secrecy How Diffie-Hellman Fails in Practice David Adrian, Karthikeyan Bhargavan, Zakir Durumeric, Pierrick Gaudry, Matthew Green, J. Alex Halderman, Nadia Heninger, Drew Springall, Emmanuel Thom´e,

          Add to Reading List

          Source URL: ecc2015.math.u-bordeaux1.fr

          - Date: 2015-09-27 09:29:28
            10

            pusogensoc.org The Library partners with PSGS to bring you the Genealogy Center, located in our Sylvan Way location. All lectures and classes hosted in the Heninger Room. Lectures

            Add to Reading List

            Source URL: www.pusogensoc.org

            Language: English - Date: 2016-05-26 17:37:33
              UPDATE