Certificate transparency B Laurie Communications of the ACM 57 (10), 40-46, 2014 | 571 | 2014 |
Faster and timing-attack resistant AES-GCM E Käsper, P Schwabe Cryptographic Hardware and Embedded Systems-CHES 2009: 11th International …, 2009 | 326 | 2009 |
{DROWN}: Breaking {TLS} using sslv2 N Aviram, S Schinzel, J Somorovsky, N Heninger, M Dankel, J Steube, ... 25th {USENIX} Security Symposium ({USENIX} Security 16), 689-706, 2016 | 262 | 2016 |
{DROWN}: Breaking {TLS} using sslv2 N Aviram, S Schinzel, J Somorovsky, N Heninger, M Dankel, J Steube, ... 25th {USENIX} Security Symposium ({USENIX} Security 16), 689-706, 2016 | 262 | 2016 |
Fast elliptic curve cryptography in OpenSSL E Käsper Financial Cryptography and Data Security: FC 2011 Workshops, RLCPS and WECSR …, 2012 | 87 | 2012 |
Revocation transparency B Laurie, E Kasper Google Research, September 33, 2012 | 85 | 2012 |
Multilingual and cross-lingual news topic tracking B Pouliquen, R Steinberger, C Ignat, E Käsper, I Temnikova COLING 2004: Proceedings of the 20th International Conference on …, 2004 | 72 | 2004 |
RFC 6962: Certificate transparency B Laurie, A Langley, E Kasper RFC Editor, 2013 | 57 | 2013 |
The LANE hash function S Indesteege, E Andreeva, C De Canniere, O Dunkelman, E Käsper, ... Dagstuhl Seminar Proceedings, 2009 | 39 | 2009 |
Certificate transparency A Langley, E Kasper, B Laurie Internet Engineering Task Force, 2013 | 30 | 2013 |
Distinguishers for the Compression Function and Output Transformation of Hamsi-256. JP Aumasson, E Käsper, LR Knudsen, K Matusiewicz, RS Ødegård, ... ACISP 10, 87-103, 2010 | 30 | 2010 |
Correlated Keystreams in Moustique E Käsper, V Rijmen, TE Bjørstad, C Rechberger, M Robshaw, G Sekar Progress in Cryptology–AFRICACRYPT 2008: First International Conference on …, 2008 | 29 | 2008 |
Certificate transparency version 2.0 B Laurie, A Langley, E Kasper, E Messeri, R Stradling Internet Engineering Task Force RFC 9162, 2021 | 25 | 2021 |
The Wisdom of Crowds: Attacks and Optimal Constructions. G Danezis, C Diaz, E Käsper, C Troncoso ESORICS, 406-423, 2009 | 22 | 2009 |
Strongly Multiplicative Hierarchical Threshold Secret Sharing. E Käsper, V Nikov, S Nikova ICITS, 148-168, 2007 | 22 | 2007 |
Efficient negative databases from cryptographic hash functions G Danezis, C Diaz, S Faust, E Käsper, C Troncoso, B Preneel Information Security: 10th International Conference, ISC 2007, Valparaíso …, 2007 | 22 | 2007 |
Certificate Transparency v2. 1a B Laurie, E Kasper Links. org, September, 2012 | 17 | 2012 |
Certificate authority transparency and auditability B Laurie, A Langley, E Kasper ØØÔ»» ÛÛۺРÒ× ºÓÖ» Ð×» ÖØ Ø ÙØ ÓÖ ØÝÌÖ Ò× Ô Ö Ò Ý Ò Ù Ø Ð ØÝºÔ, 124, 2011 | 15 | 2011 |
The LANE hash function. Submission to NIST (2008) S Indesteege, E Andreeva, C De Canniere, O Dunkelman, E Käsper, ... | 14 | |
Revocation transparency (2012) B Laurie, E Kasper URL http://sump2. links. org/files/RevocationTransparency. pdf, 2014 | 12 | 2014 |