Nadia Heninger [Speaker-Timeline] [Speaker-Links]

Tell us about missing data
Title Conference Tags
TPM-FAIL: TPM meets Timing and Lattice Attacks 29thUSENIXSecuritySymposium-2020 - Berkeley, USA
In search of CurveSwap: Measuring elliptic curve implementations in the wild IEEEEuropeanSymposiumS&P-2018 - London, United Kingdom
A kilobit hidden SNFS discrete logarithm computation EuroCrypt-2017 - paris,france
Measuring small subgroup attacks against Diffie-Hellman NDSS-2017 - california,usa
DROWN: Breaking TLS Using SSLv2 USENIX-2016 - austin,usa
An Update on the Backdoor in Juniper's ScreenOS RWC-2016 - stanford,usa
Logjam: Diffie-Hellman, discrete logs, the NSA, and you CCC-2015 - hamburg,germany
Crypto Tales from the Trenches CCC-2014 - Hamburg,Germany
After Coffee Break Crypto usenix-2014 - san diego,usa
How not to Generate Random Numbers ACNS-2014 - Lausanne, Switzerland
Elliptic Curve Cryptography in Practice FinanCryptandInfoSec-2014 - Accra,Barbados
Factoring RSA keys from certified smart cards: Coppersmith in the wild asiacrypt-2013 - Bengalore,India
FactHacks Chaos Communication Congress-29 - Hamburg, Germany
Mining Your Ps and Qs: Detection of Widespread Weak Keys in Network Devices USENIX-2012 - Washington, D.C.
Optimally Robust Private Information Retrieval USENIX-2012 - Washington, D.C.
Practical Information On The Ìcold Bootî Attack CONFidence -2009 - Krakow, Poland Security
Lest We Remember: Cold Boot Attacks On Encryption Keys 17th USENIX Security Symposium-2008 - San Jose, USA Security