Faster and timing-attack resistant AES-GCM E Käsper, P Schwabe International Workshop on Cryptographic Hardware and Embedded Systems, 1-17, 2009 | 363 | 2009 |
{DROWN}: Breaking {TLS} Using {SSLv2} N Aviram, S Schinzel, J Somorovsky, N Heninger, M Dankel, J Steube, ... 25th USENIX Security Symposium (USENIX Security 16), 689-706, 2016 | 328 | 2016 |
Certificate transparency B Laurie Communications of the ACM 57 (10), 40-46, 2014 | 321 | 2014 |
Revocation transparency B Laurie, E Kasper Google Research, September 33, 2012 | 101 | 2012 |
Fast elliptic curve cryptography in OpenSSL E Käsper Financial Cryptography and Data Security: FC 2011 Workshops, RLCPS and WECSR …, 2012 | 97 | 2012 |
Multilingual and cross-lingual news topic tracking B Pouliquen, R Steinberger, C Ignat, E Käsper, I Temnikova COLING 2004: Proceedings of the 20th International Conference on …, 2004 | 75 | 2004 |
Certificate transparency version 2.0 B Laurie, A Langley, E Kasper, E Messeri, R Stradling Internet Requests for Comments, RFC Editor, RFC 9162, 2021 | 69 | 2021 |
The LANE hash function S Indesteege, E Andreeva, C De Canniere, O Dunkelman, E Käsper, ... Dagstuhl Seminar Proceedings, 2009 | 40 | 2009 |
Certificate transparency A Langley, E Kasper, B Laurie Internet Engineering Task Force, 2013 | 37 | 2013 |
Distinguishers for the compression function and output transformation of Hamsi-256 JP Aumasson, E Käsper, LR Knudsen, K Matusiewicz, R Ødegård, ... Information Security and Privacy: 15th Australasian Conference, ACISP 2010 …, 2010 | 30 | 2010 |
Strongly multiplicative hierarchical threshold secret sharing E Käsper, V Nikov, S Nikova Information Theoretic Security: Second International Conference, ICITS 2007 …, 2009 | 29 | 2009 |
Correlated Keystreams in Moustique E Käsper, V Rijmen, TE Bjørstad, C Rechberger, M Robshaw, G Sekar Progress in Cryptology–AFRICACRYPT 2008: First International Conference on …, 2008 | 29 | 2008 |
Efficient negative databases from cryptographic hash functions G Danezis, C Diaz, S Faust, E Käsper, C Troncoso, B Preneel International Conference on Information Security, 423-436, 2007 | 22 | 2007 |
The wisdom of Crowds: attacks and optimal constructions G Danezis, C Diaz, E Käsper, C Troncoso Computer Security–ESORICS 2009: 14th European Symposium on Research in …, 2009 | 21 | 2009 |
Certificate Transparency v2. 1a B Laurie, E Kasper Links. org, September, 2012 | 18 | 2012 |
Certificate Transparency (RFC 6962) B Laurie, A Langley, E Kasper IETF RCFs, 2013 | 17 | 2013 |
Certificate authority transparency and auditability B Laurie, A Langley, E Kasper ØØÔ»» ÛÛۺРÒ× ºÓÖ» Ð×» ÖØ Ø ÙØ ÓÖ ØÝÌÖ Ò× Ô Ö Ò Ý Ò Ù Ø Ð ØݺÔ, 124, 2011 | 15 | 2011 |
The LANE hash function. Submission to NIST (2008) S Indesteege, E Andreeva, C De Canniere, O Dunkelman, E Käsper, ... | 14 | |
Revocation transparency (2012) B Laurie, E Kasper URL http://sump2. links. org/files/RevocationTransparency. pdf, 0 | 12 | |
The dangers of composing anonymous channels G Danezis, E Käsper International Workshop on Information Hiding, 191-206, 2012 | 7 | 2012 |