Obserwuj
Nimrod Aviram
Nimrod Aviram
Zweryfikowany adres z mail.tau.ac.il
Tytuł
Cytowane przez
Cytowane przez
Rok
{DROWN}: Breaking {TLS} Using {SSLv2}
N Aviram, S Schinzel, J Somorovsky, N Heninger, M Dankel, J Steube, ...
25th USENIX Security Symposium (USENIX Security 16), 689-706, 2016
3252016
Session resumption protocols and efficient forward security for TLS 1.3 0-RTT
N Aviram, K Gellert, T Jager
Journal of Cryptology 34 (3), 20, 2021
602021
Raccoon Attack: Finding and Exploiting {Most-Significant-Bit-Oracles} in {TLS-DH (E})
R Merget, M Brinkmann, N Aviram, J Somorovsky, J Mittmann, J Schwenk
30th USENIX Security Symposium (USENIX Security 21), 213-230, 2021
382021
Scalable scanning and automatic classification of {TLS} padding oracle vulnerabilities
R Merget, J Somorovsky, N Aviram, C Young, J Fliegenschmidt, ...
28th USENIX Security Symposium (USENIX Security 19), 1029-1046, 2019
342019
Adaptive probing and communication in sensor networks
I Ragoler, Y Matias, N Aviram
Ad-Hoc, Mobile, and Wireless Networks: Third International Conference, ADHOC …, 2004
102004
Practical (post-quantum) key combiners from one-wayness and applications to TLS
N Aviram, B Dowling, I Komargodski, KG Paterson, E Ronen, E Yogev
Cryptology ePrint Archive, 2022
62022
Optimizing Dijkstra for real-world performance
N Aviram, Y Shavitt
arXiv preprint arXiv:1505.05033, 2015
52015
Nie można teraz wykonać tej operacji. Spróbuj ponownie później.
Prace 1–7