Nadia Heninger

Results: 26



#Item
1Cryptography / Algebra / Abstract algebra / Group theory / Computational hardness assumptions / DiffieHellman key exchange / Cyclic group / Logjam / Generating set of a group / Subgroup / Whitfield Diffie / Computational DiffieHellman assumption

Measuring small subgroup attacks against Diffie-Hellman Luke Valenta∗ , David Adrian† , Antonio Sanso‡ , Shaanan Cohney∗ , Joshua Fried∗ , Marcella Hastings∗ , J. Alex Halderman† , Nadia Heninger∗ ∗ Uni

Add to Reading List

Source URL: www.seas.upenn.edu

Language: English - Date: 2017-09-13 08:39:05
2Algebra / Abstract algebra / Mathematics / Lie groups / Post-quantum cryptography / Algebraic structures / Lattice-based cryptography / Analytic geometry / Lattice / Field extension / Ring / Order

Characterizing overstretched NTRU attacks Gabrielle De Micheli, Nadia Heninger and Barak Shani University of Pennsylvania Abstract Overstretched NTRU, an NTRU variant with a large modulus, has been used as a building

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2018-06-25 14:23:34
3Cryptography / Elliptic curve cryptography / Elliptic-curve DiffieHellman / DiffieHellman key exchange / Cryptographic protocols / Alice and Bob / Computational hardness assumptions / Transport Layer Security / WolfSSH

In search of CurveSwap: Measuring elliptic curve implementations in the wild Luke Valenta∗ , Nick Sullivan† , Antonio Sanso‡ , Nadia Heninger∗ ∗ University

Add to Reading List

Source URL: www.seas.upenn.edu

Language: English - Date: 2018-07-31 15:14:59
4Algebra / Mathematics / Quadratic forms / Lattice points / Abstract algebra / Modular form / Leech lattice / E8 lattice / Lattice / Modular lattice / Unimodular lattice

arXiv:math/0509316v4 [math.NT] 8 AprOn the Integrality of nth Roots of Generating Functions Nadia Heninger(1) Computer Science Department Princeton University

Add to Reading List

Source URL: arxiv.org

Language: English - Date: 2013-10-10 07:34:34
5

In search of CurveSwap: Measuring elliptic curve implementations in the wild Luke Valenta∗ , Nick Sullivan† , Antonio Sanso‡ , Nadia Heninger∗ ∗ University of Pennsylvania, † Cloudflare, Inc., ‡ Adobe Syste

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2018-03-29 18:22:30
    6

    Weak Keys Remain Widespread in Network Devices Marcella Hastings Joshua Fried Nadia Heninger

    Add to Reading List

    Source URL: www.cis.upenn.edu

    - Date: 2017-01-10 09:33:37
      7

      A Systematic Analysis of the Juniper Dual EC Incident Stephen Checkoway*, Shaanan Cohney** , Christina Garman† Matthew Green†, Nadia Heninger** , ††

      Add to Reading List

      Source URL: eprint.iacr.org

      - Date: 2016-04-14 04:25:54
        8

        Measuring small subgroup attacks against Diffie-Hellman Luke Valenta∗ , David Adrian† , Antonio Sanso‡ , Shaanan Cohney∗ , Joshua Fried∗ , Marcella Hastings∗ , J. Alex Halderman† , Nadia Heninger∗ ∗ Uni

        Add to Reading List

        Source URL: eprint.iacr.org

        - Date: 2016-10-23 23:14:23
          9

          Imperfect Forward Secrecy How Diffie-Hellman Fails in Practice David Adrian, Karthikeyan Bhargavan, Zakir Durumeric, Pierrick Gaudry, Matthew Green, J. Alex Halderman, Nadia Heninger, Drew Springall, Emmanuel Thom´e,

          Add to Reading List

          Source URL: ecc2015.math.u-bordeaux1.fr

          - Date: 2015-09-27 09:29:28
            10Cryptography / Computing / Cryptographic protocols / Juniper Networks / Pseudorandom number generators / Cryptographic nonce / Internet protocols / NetScreen Technologies / Challengeresponse authentication / ScreenOS / Internet Key Exchange / DiffieHellman key exchange

            A Systematic Analysis of the Juniper Dual EC Incident Stephen Checkoway*, Shaanan Cohney†, Christina Garman‡, Matthew Green‡, Nadia Heninger†, Jacob Maskiewicz§, Eric Rescorla§, Hovav Shacham§, Ralf-Philipp We

            Add to Reading List

            Source URL: dualec.org

            Language: English - Date: 2016-04-15 12:48:33
            UPDATE