Nadia Heninger

Results: 26



#Item
11

A Systematic Analysis of the Juniper Dual EC Incident Stephen Checkoway*, Shaanan Cohney** , Christina Garman† Matthew Green†, Nadia Heninger** , ††

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2016-04-14 04:25:54
    12

    Exploiting poor randomness: RSA, DSA, and ECDSA disasters Nadia Heninger University of Pennsylvania

    Add to Reading List

    Source URL: attackschool.di.uminho.pt

    Language: English - Date: 2014-11-03 05:59:17
      13

      Exploiting poor randomness: Collecting data Nadia Heninger University of Pennsylvania October 14, 2014

      Add to Reading List

      Source URL: attackschool.di.uminho.pt

      Language: English - Date: 2014-11-03 05:59:19
        14Polynomials / Coding theory / Field theory / Error detection and correction / Finite field / General number field sieve / Irreducible polynomial / Reed–Solomon error correction / Algebraic integer / Abstract algebra / Algebra / Mathematics

        Innovations in Computer ScienceIdeal Forms of Coppersmith’s Theorem and Guruswami-Sudan List Decoding Henry Cohn∗ Nadia Heninger? Microsoft Research New England, One Memorial Drive, Cambridge, MA 02142

        Add to Reading List

        Source URL: conference.itcs.tsinghua.edu.cn

        Language: English - Date: 2010-12-15 03:49:23
        15RSA / Blum–Goldwasser cryptosystem / Schmidt–Samoa cryptosystem / Cryptography / Public-key cryptography / Electronic commerce

        Reconstructing RSA Private Keys from Random Key Bits Nadia Heninger and

        Add to Reading List

        Source URL: www.iacr.org

        Language: English - Date: 2009-09-07 12:28:06
        16Finite fields / Computational hardness assumptions / Group theory / Diffie–Hellman key exchange / XTR / Secure Shell / Cipher suite / Index calculus algorithm / Elliptic curve Diffie–Hellman / Cryptography / Abstract algebra / Cryptographic protocols

        Imperfect Forward Secrecy: How Diffie-Hellman Fails in Practice David Adrian¶ Karthikeyan Bhargavan∗ Zakir Durumeric¶ Pierrick Gaudry† Matthew Green§ J. Alex Halderman¶ Nadia Heninger‡ Drew Springall¶ Emmanuel

        Add to Reading List

        Source URL: weakdh.org

        Language: English - Date: 2015-05-22 22:25:48
        17Electronic commerce / RSA / Key / Cryptanalysis / Cryptography / Public-key cryptography / Key management

        Exploiting Poor Randomness: Lattice-Based Techniques Nadia Heninger University of Pennsylvania October 16, 2014

        Add to Reading List

        Source URL: attackschool.di.uminho.pt

        Language: English - Date: 2014-11-03 05:59:17
        18Cryptography / Pseudorandomness / Information theory / Pseudorandom number generators / Random number generation / Pseudorandom generator / Entropy / Extractor / Randomness extractor / Theoretical computer science / Applied mathematics / Randomness

        Exploiting Poor Randomness Nadia Heninger University of Pennsylvania October 13, 2014

        Add to Reading List

        Source URL: attackschool.di.uminho.pt

        Language: English - Date: 2014-11-03 05:59:17
        19Outline of cryptography / Side channel attack / Edward Felten / Cryptanalysis / International Cryptology Conference / Cryptographic engineering / Elliptic curve cryptography / Cryptography / Lattice-based cryptography / Pwnie Awards

        Nadia Heninger +[removed]Computer & Information Science Department University of Pennsylvania 3330 Walnut St. Philadelphia, PA[removed]

        Add to Reading List

        Source URL: www.cis.upenn.edu

        Language: English - Date: 2014-02-25 14:14:07
        20Number theory / RSA / Modular arithmetic / Chinese remainder theorem / Merkle–Hellman knapsack cryptosystem / XTR / Public-key cryptography / Mathematics / Electronic commerce

        Reconstructing RSA Private Keys from Random Key Bits Nadia Heninger [removed] Hovav Shacham [removed]

        Add to Reading List

        Source URL: eprint.iacr.org

        Language: English - Date: 2010-02-25 20:05:34
        UPDATE