Nadia Heninger

Results: 26



#Item
11A Systematic Analysis of the Juniper Dual EC Incident Stephen Checkoway*, Shaanan Cohney** , Christina Garman† Matthew Green†, Nadia Heninger** , ††

A Systematic Analysis of the Juniper Dual EC Incident Stephen Checkoway*, Shaanan Cohney** , Christina Garman† Matthew Green†, Nadia Heninger** , ††

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2016-04-14 04:25:54
    12Exploiting poor randomness: RSA, DSA, and ECDSA disasters Nadia Heninger University of Pennsylvania

    Exploiting poor randomness: RSA, DSA, and ECDSA disasters Nadia Heninger University of Pennsylvania

    Add to Reading List

    Source URL: attackschool.di.uminho.pt

    Language: English - Date: 2014-11-03 05:59:17
      13Exploiting poor randomness: Collecting data Nadia Heninger University of Pennsylvania  October 14, 2014

      Exploiting poor randomness: Collecting data Nadia Heninger University of Pennsylvania October 14, 2014

      Add to Reading List

      Source URL: attackschool.di.uminho.pt

      Language: English - Date: 2014-11-03 05:59:19
        14Innovations in Computer ScienceIdeal Forms of Coppersmith’s Theorem and Guruswami-Sudan List Decoding Henry Cohn∗ Nadia Heninger? Microsoft Research New England, One Memorial Drive, Cambridge, MA 02142

        Innovations in Computer ScienceIdeal Forms of Coppersmith’s Theorem and Guruswami-Sudan List Decoding Henry Cohn∗ Nadia Heninger? Microsoft Research New England, One Memorial Drive, Cambridge, MA 02142

        Add to Reading List

        Source URL: conference.itcs.tsinghua.edu.cn

        Language: English - Date: 2010-12-15 03:49:23
        15Reconstructing RSA Private Keys from Random Key Bits Nadia Heninger and

        Reconstructing RSA Private Keys from Random Key Bits Nadia Heninger and

        Add to Reading List

        Source URL: www.iacr.org

        Language: English - Date: 2009-09-07 12:28:06
        16Imperfect Forward Secrecy: How Diffie-Hellman Fails in Practice David Adrian¶ Karthikeyan Bhargavan∗ Zakir Durumeric¶ Pierrick Gaudry† Matthew Green§ J. Alex Halderman¶ Nadia Heninger‡ Drew Springall¶ Emmanuel

        Imperfect Forward Secrecy: How Diffie-Hellman Fails in Practice David Adrian¶ Karthikeyan Bhargavan∗ Zakir Durumeric¶ Pierrick Gaudry† Matthew Green§ J. Alex Halderman¶ Nadia Heninger‡ Drew Springall¶ Emmanuel

        Add to Reading List

        Source URL: weakdh.org

        Language: English - Date: 2015-05-22 22:25:48
        17Exploiting Poor Randomness: Lattice-Based Techniques Nadia Heninger University of Pennsylvania  October 16, 2014

        Exploiting Poor Randomness: Lattice-Based Techniques Nadia Heninger University of Pennsylvania October 16, 2014

        Add to Reading List

        Source URL: attackschool.di.uminho.pt

        Language: English - Date: 2014-11-03 05:59:17
        18Exploiting Poor Randomness Nadia Heninger University of Pennsylvania October 13, 2014

        Exploiting Poor Randomness Nadia Heninger University of Pennsylvania October 13, 2014

        Add to Reading List

        Source URL: attackschool.di.uminho.pt

        Language: English - Date: 2014-11-03 05:59:17
        19Nadia Heninger +[removed]Computer & Information Science Department University of Pennsylvania 3330 Walnut St. Philadelphia, PA[removed]

        Nadia Heninger +[removed]Computer & Information Science Department University of Pennsylvania 3330 Walnut St. Philadelphia, PA[removed]

        Add to Reading List

        Source URL: www.cis.upenn.edu

        Language: English - Date: 2014-02-25 14:14:07
        20Reconstructing RSA Private Keys from Random Key Bits Nadia Heninger [removed] Hovav Shacham [removed]

        Reconstructing RSA Private Keys from Random Key Bits Nadia Heninger [removed] Hovav Shacham [removed]

        Add to Reading List

        Source URL: eprint.iacr.org

        Language: English - Date: 2010-02-25 20:05:34