Back to Results
First PageMeta Content
Finite fields / Computational hardness assumptions / Group theory / Diffie–Hellman key exchange / XTR / Secure Shell / Cipher suite / Index calculus algorithm / Elliptic curve Diffie–Hellman / Cryptography / Abstract algebra / Cryptographic protocols


Imperfect Forward Secrecy: How Diffie-Hellman Fails in Practice David Adrian¶ Karthikeyan Bhargavan∗ Zakir Durumeric¶ Pierrick Gaudry† Matthew Green§ J. Alex Halderman¶ Nadia Heninger‡ Drew Springall¶ Emmanuel
Add to Reading List

Document Date: 2015-05-22 22:25:48


Open Document

File Size: 1,27 MB

Share Result on Facebook

Company

Bernstein / 3M / Oakley Group / AES / Amazon / Oakley Group 2 / The times / ATTACKING TLS Export / Intel / Microsoft / /

Country

United States / /

Currency

AED / USD / /

Event

FDA Phase / /

Facility

GMP library / Intel Sandy Bridge / Tordella Supercomputer Building / /

IndustryTerm

performance computing / decryption infrastructure / proper sieving software / Internet protocols / web conferencing servers / log algorithm / web browser / real time / server-defined groups / server-defined / vulnerable server / generated groups / exploit internet traffic / supported key exchange algorithm / purpose hardware / above algorithms / Internet-wide / Internet traffic / grid computing resources / built-in groups / commodity hardware / mainstream Internet protocols / lambda algorithm / Internet community / cryptographic transport protocol / site-to-site / main key establishment protocol / Web browsers / nm technology node / related number field sieve algorithm / communications software / application-specific hardware / highperformance computing system / Apache / Internet security protocols / exploitation services / web servers / stronger groups / quasi-polynomial algorithm / number field sieve algorithm / number field sieve algorithms / log algorithms / crypto algorithms / number field sieve discrete log algorithm / published publickey algorithm / web interfaces / Internet Key Exchange / real-world systems / Internet Explorer / /

OperatingSystem

Microsoft Windows / /

Organization

Oak Ridge National Lab / ASIC / University of Pennsylvania Johns Hopkins University / National Security Agency / National Science Foundation / /

Person

Santiago Zanella-Béguelink Paul / Paul Zimmermann / Bob / Benjamin VanderSloot / Edward Snowden / Nadia Heninger‡ Drew Springall / J. Alex Halderman¶ Nadia Heninger / Forward Secrecy / Drew Springall¶ Emmanuel Thomé / Nancy-Grand Est / Luke Valenta‡ Benjamin / Eric Wustrow¶ Santiago / Emmanuel Thomé† Luke Valenta / Brian Smith / Alice / van Oorschot / Wagner / /

Position

system administrator / Governor / Forward / /

Product

ZMap UDP probe module / IKEv1 / ZMap UDP / ZMap / /

ProgrammingLanguage

Java / C / /

ProvinceOrState

Michigan / /

PublishedMedium

Der Spiegel / /

Technology

RAM / key exchange algorithm / Pohlig-Hellman algorithm / IKE protocol / 3.2 Previous Cross-Protocol / 1 algorithm / number field sieve algorithm / SSH protocol / encryption / cryptography / crypto algorithms / number field sieve algorithms / TLS protocol / Java / cryptographic transport protocol / mutually supported key exchange algorithm / Digital Signature / block Wiedemann algorithm / closely related number field sieve algorithm / above algorithms / main key establishment protocol / VPN / Internet protocols / UDP / log algorithms / ssl / Wiener algorithm / Pollard lambda algorithm / VPN protocols / quasi-polynomial algorithm / log algorithm / ASIC / mainstream Internet protocols / ASCII / AH protocols / transport encryption / caching / IPv4 / Internet security protocols / published publickey algorithm / /

URL

sohu.com / www.fbi.gov / /

SocialTag