{DROWN}: Breaking {TLS} using sslv2 N Aviram, S Schinzel, J Somorovsky, N Heninger, M Dankel, J Steube, ... 25th {USENIX} Security Symposium ({USENIX} Security 16), 689-706, 2016 | 265 | 2016 |
Session resumption protocols and efficient forward security for TLS 1.3 0-RTT N Aviram, K Gellert, T Jager Journal of Cryptology 34 (3), 20, 2021 | 48 | 2021 |
Scalable Scanning and Automatic Classification of TLS Padding Oracle Vulnerabilities. R Merget, J Somorovsky, N Aviram, C Young, J Fliegenschmidt, ... USENIX Security Symposium, 1029-1046, 2019 | 18 | 2019 |
Raccoon Attack: Finding and Exploiting Most-Significant-Bit-Oracles in TLS-DH (E). R Merget, M Brinkmann, N Aviram, J Somorovsky, J Mittmann, J Schwenk USENIX Security Symposium, 213-230, 2021 | 14 | 2021 |
Adaptive probing and communication in sensor networks I Ragoler, Y Matias, N Aviram Ad-Hoc, Mobile, and Wireless Networks: Third International Conference, ADHOC …, 2004 | 10 | 2004 |
Optimizing Dijkstra for real-world performance N Aviram, Y Shavitt arXiv preprint arXiv:1505.05033, 2015 | 5 | 2015 |
Practical (post-quantum) key combiners from one-wayness and applications to TLS N Aviram, B Dowling, I Komargodski, KG Paterson, E Ronen, E Yogev Cryptology ePrint Archive, 2022 | 2 | 2022 |
help promote N Aviram, S Schinzel, J Somorovsky, N Heninger, M Dankel, J Steube, ... | | |