Volgen
Nimrod Aviram
Nimrod Aviram
Geverifieerd e-mailadres voor mail.tau.ac.il
Titel
Geciteerd door
Geciteerd door
Jaar
{DROWN}: Breaking {TLS} using sslv2
N Aviram, S Schinzel, J Somorovsky, N Heninger, M Dankel, J Steube, ...
25th {USENIX} Security Symposium ({USENIX} Security 16), 689-706, 2016
2652016
Session resumption protocols and efficient forward security for TLS 1.3 0-RTT
N Aviram, K Gellert, T Jager
Journal of Cryptology 34 (3), 20, 2021
492021
Scalable Scanning and Automatic Classification of TLS Padding Oracle Vulnerabilities.
R Merget, J Somorovsky, N Aviram, C Young, J Fliegenschmidt, ...
USENIX Security Symposium, 1029-1046, 2019
182019
Raccoon Attack: Finding and Exploiting Most-Significant-Bit-Oracles in TLS-DH (E).
R Merget, M Brinkmann, N Aviram, J Somorovsky, J Mittmann, J Schwenk
USENIX Security Symposium, 213-230, 2021
142021
Adaptive probing and communication in sensor networks
I Ragoler, Y Matias, N Aviram
Ad-Hoc, Mobile, and Wireless Networks: Third International Conference, ADHOC …, 2004
102004
Optimizing Dijkstra for real-world performance
N Aviram, Y Shavitt
arXiv preprint arXiv:1505.05033, 2015
52015
Practical (post-quantum) key combiners from one-wayness and applications to TLS
N Aviram, B Dowling, I Komargodski, KG Paterson, E Ronen, E Yogev
Cryptology ePrint Archive, 2022
22022
help promote
N Aviram, S Schinzel, J Somorovsky, N Heninger, M Dankel, J Steube, ...
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–8