What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Nadia Heninger
Google Scholar
38
publications in security and cryptology related venues
Year
Venue
Title
2024
journals/cic
Survey: Recovering cryptographic keys from partial information, by example.
Gabrielle De Micheli
Nadia Heninger
2024
conf/uss
RADIUS/UDP Considered Harmful.
Sharon Goldberg
Miro Haller
Nadia Heninger
Mike Milano
Dan Shumow
Marc Stevens
Adam Suhl
2024
conf/uss
Abuse-Resistant Location Tracking: Balancing Privacy and Safety in the Offline Finding Ecosystem.
Harry Eldridge
Gabrielle Beck
Matthew Green
Nadia Heninger
Abhishek Jain
2024
conf/pkc
On the Possibility of a Backdoor in the Micali-Schnorr Generator.
Hannah Davis
Matthew D. Green
Nadia Heninger
Keegan Ryan
Adam Suhl
2024
conf/asiacrypt
On the Semidirect Discrete Logarithm Problem in Finite Groups.
Christopher Battarbee
Giacomo Borin
Julian Brough
Ryann Cartor
Tobias Hemmert
Nadia Heninger
David Jao
Delaram Kahrobaei
Laura Maddison
Edoardo Persichetti
Angela Robinson
Daniel Smith-Tone
Rainer Steinwandt
2023
conf/ccs
Passive SSH Key Compromise via Lattices.
Keegan Ryan
Kaiwen He
George Arnold Sullivan
Nadia Heninger
2023
conf/crypto
Fast Practical Lattice Reduction Through Iterated Compression.
Keegan Ryan
Nadia Heninger
2023
conf/pkc
The Hidden Number Problem with Small Unknown Multipliers: Cryptanalyzing MEGA in Six Queries and Other Applications.
Nadia Heninger
Keegan Ryan
2023
conf/africacrypt
The Curious Case of the Half-Half Bitcoin ECDSA Nonces.
Dylan Rowe
Joachim Breitner
Nadia Heninger
2022
conf/uss
Open to a fault: On the passive compromise of TLS keys via transient errors.
George Arnold Sullivan
Jackson Sippe
Nadia Heninger
Eric Wustrow
2021
conf/eurocrypt
On Bounded Distance Decoding with Predicate: Breaking the "Lattice Barrier" for the Hidden Number Problem.
Martin R. Albrecht
Nadia Heninger
2020
conf/uss
CopyCat: Controlled Instruction-Level Attacks on Enclaves.
Daniel Moghimi
Jo Van Bulck
Nadia Heninger
Frank Piessens
Berk Sunar
2020
conf/uss
TPM-FAIL: TPM meets Timing and Lattice Attacks.
Daniel Moghimi
Berk Sunar
Thomas Eisenbarth
Nadia Heninger
2020
conf/crypto
Comparing the Difficulty of Factorization and Discrete Logarithm: A 240-Digit Experiment.
Fabrice Boudot
Pierrick Gaudry
Aurore Guillevic
Nadia Heninger
Emmanuel Thomé
Paul Zimmermann
2020
conf/sp
Pseudorandom Black Swans: Cache Attacks on CTR_DRBG.
Shaanan Cohney
Andrew Kwong
Shahar Paz
Daniel Genkin
Nadia Heninger
Eyal Ronen
Yuval Yarom
2019
conf/fc
Short Paper: The Proof is in the Pudding - Proofs of Work for Solving Discrete Logarithms.
Marcella Hastings
Nadia Heninger
Eric Wustrow
2019
conf/fc
Biased Nonce Sense: Lattice Attacks Against Weak ECDSA Signatures in Cryptocurrencies.
Joachim Breitner
Nadia Heninger
2018
journals/tches
CacheQuote: Efficiently Recovering Long-term Secrets of SGX EPID via Cache Attacks.
Fergus Dall
Gabrielle De Micheli
Thomas Eisenbarth
Daniel Genkin
Nadia Heninger
Ahmad Moghimi
Yuval Yarom
2018
conf/ccs
Practical State Recovery Attacks against Legacy RNG Implementations.
Shaanan N. Cohney
Matthew D. Green
Nadia Heninger
2018
conf/eurosp
In Search of CurveSwap: Measuring Elliptic Curve Implementations in the Wild.
Luke Valenta
Nick Sullivan
Antonio Sanso
Nadia Heninger
2017
conf/ches
Sliding Right into Disaster: Left-to-Right Sliding Windows Leak.
Daniel J. Bernstein
Joachim Breitner
Daniel Genkin
Leon Groot Bruinderink
Nadia Heninger
Tanja Lange
Christine van Vredendaal
Yuval Yarom
2017
conf/ndss
Measuring small subgroup attacks against Diffie-Hellman.
Luke Valenta
David Adrian
Antonio Sanso
Shaanan Cohney
Joshua Fried
Marcella Hastings
J. Alex Halderman
Nadia Heninger
2017
conf/eurocrypt
A Kilobit Hidden SNFS Discrete Logarithm Computation.
Joshua Fried
Pierrick Gaudry
Nadia Heninger
Emmanuel Thomé
2016
conf/ccs
A Systematic Analysis of the Juniper Dual EC Incident.
Stephen Checkoway
Jacob Maskiewicz
Christina Garman
Joshua Fried
Shaanan Cohney
Matthew Green
Nadia Heninger
Ralf-Philipp Weinmann
Eric Rescorla
Hovav Shacham
2016
conf/uss
DROWN: Breaking TLS Using SSLv2.
Nimrod Aviram
Sebastian Schinzel
Juraj Somorovsky
Nadia Heninger
Maik Dankel
Jens Steube
Luke Valenta
David Adrian
J. Alex Halderman
Viktor Dukhovni
Emilia Käsper
Shaanan Cohney
Susanne Engels
Christof Paar
Yuval Shavitt
2016
conf/fc
Factoring as a Service.
Luke Valenta
Shaanan Cohney
Alex Liao
Joshua Fried
Satya Bodduluri
Nadia Heninger
2016
conf/ches
CacheBleed: A Timing Attack on OpenSSL Constant Time RSA.
Yuval Yarom
Daniel Genkin
Nadia Heninger
2016
conf/asiacrypt
Cryptographic Applications of Capacity Theory: On the Optimality of Coppersmith's Method for Univariate Polynomials.
Ted Chinburg
Brett Hemenway
Nadia Heninger
Zachary Scherr
2015
conf/ccs
Imperfect Forward Secrecy: How Diffie-Hellman Fails in Practice.
David Adrian
Karthikeyan Bhargavan
Zakir Durumeric
Pierrick Gaudry
Matthew Green
J. Alex Halderman
Nadia Heninger
Drew Springall
Emmanuel Thomé
Luke Valenta
Benjamin VanderSloot
Eric Wustrow
Santiago Zanella-Béguelin
Paul Zimmermann
2014
conf/fc
Elliptic Curve Cryptography in Practice.
Joppe W. Bos
J. Alex Halderman
Nadia Heninger
Jonathan Moore
Michael Naehrig
Eric Wustrow
2013
conf/asiacrypt
Factoring RSA Keys from Certified Smart Cards: Coppersmith in the Wild.
Daniel J. Bernstein
Yun-An Chang
Chen-Mou Cheng
Li-Ping Chou
Nadia Heninger
Tanja Lange
Nicko van Someren
2012
conf/uss
Mining Your Ps and Qs: Detection of Widespread Weak Keys in Network Devices.
Nadia Heninger
Zakir Durumeric
Eric Wustrow
J. Alex Halderman
2012
conf/uss
Optimally Robust Private Information Retrieval.
Casey Devet
Ian Goldberg
Nadia Heninger
2010
conf/uss
Computational Complexity and Information Asymmetry in Election Audits with Low-Entropy Randomness.
Nadia Heninger
2010
conf/ndss
Defeating Vanish with Low-Cost Sybil Attacks Against Large DHTs.
Scott Wolchok
Owen S. Hofmann
Nadia Heninger
Edward W. Felten
J. Alex Halderman
Christopher J. Rossbach
Brent Waters
Emmett Witchel
2009
conf/crypto
Reconstructing RSA Private Keys from Random Key Bits.
Nadia Heninger
Hovav Shacham
2009
conf/sp
Fingerprinting Blank Paper Using Commodity Scanners.
William Clarkson
Tim Weyrich
Adam Finkelstein
Nadia Heninger
J. Alex Halderman
Edward W. Felten
2008
conf/uss
Lest We Remember: Cold Boot Attacks on Encryption Keys.
J. Alex Halderman
Seth D. Schoen
Nadia Heninger
William Clarkson
William Paul
Joseph A. Calandrino
Ariel J. Feldman
Jacob Appelbaum
Edward W. Felten
Coauthors
Abhishek Jain
(1)
Adam Finkelstein
(1)
Adam Suhl
(2)
Ahmad Moghimi
(1)
Alex Liao
(1)
Andrew Kwong
(1)
Angela Robinson
(1)
Antonio Sanso
(2)
Ariel J. Feldman
(1)
Aurore Guillevic
(1)
Benjamin VanderSloot
(1)
Berk Sunar
(2)
Brent Waters
(1)
Brett Hemenway
(1)
Casey Devet
(1)
Chen-Mou Cheng
(1)
Christina Garman
(1)
Christine van Vredendaal
(1)
Christof Paar
(1)
Christopher Battarbee
(1)
Christopher J. Rossbach
(1)
Dan Shumow
(1)
Daniel Genkin
(4)
Daniel J. Bernstein
(2)
Daniel Moghimi
(2)
Daniel Smith-Tone
(1)
David Adrian
(3)
David Jao
(1)
Delaram Kahrobaei
(1)
Drew Springall
(1)
Dylan Rowe
(1)
Edoardo Persichetti
(1)
Edward W. Felten
(3)
Emilia Käsper
(1)
Emmanuel Thomé
(3)
Emmett Witchel
(1)
Eric Rescorla
(1)
Eric Wustrow
(5)
Eyal Ronen
(1)
Fabrice Boudot
(1)
Fergus Dall
(1)
Frank Piessens
(1)
Gabrielle Beck
(1)
Gabrielle De Micheli
(2)
George Arnold Sullivan
(2)
Giacomo Borin
(1)
Hannah Davis
(1)
Harry Eldridge
(1)
Hovav Shacham
(2)
Ian Goldberg
(1)
J. Alex Halderman
(8)
Jackson Sippe
(1)
Jacob Appelbaum
(1)
Jacob Maskiewicz
(1)
Jens Steube
(1)
Jo Van Bulck
(1)
Joachim Breitner
(3)
Jonathan Moore
(1)
Joppe W. Bos
(1)
Joseph A. Calandrino
(1)
Joshua Fried
(4)
Julian Brough
(1)
Juraj Somorovsky
(1)
Kaiwen He
(1)
Karthikeyan Bhargavan
(1)
Keegan Ryan
(4)
Laura Maddison
(1)
Leon Groot Bruinderink
(1)
Li-Ping Chou
(1)
Luke Valenta
(5)
Maik Dankel
(1)
Marc Stevens
(1)
Marcella Hastings
(2)
Martin R. Albrecht
(1)
Matthew D. Green
(2)
Matthew Green
(3)
Michael Naehrig
(1)
Mike Milano
(1)
Miro Haller
(1)
Nadia Heninger
(38)
Nick Sullivan
(1)
Nicko van Someren
(1)
Nimrod Aviram
(1)
Owen S. Hofmann
(1)
Paul Zimmermann
(2)
Pierrick Gaudry
(3)
Rainer Steinwandt
(1)
Ralf-Philipp Weinmann
(1)
Ryann Cartor
(1)
Santiago Zanella-Béguelin
(1)
Satya Bodduluri
(1)
Scott Wolchok
(1)
Sebastian Schinzel
(1)
Seth D. Schoen
(1)
Shaanan Cohney
(5)
Shaanan N. Cohney
(1)
Shahar Paz
(1)
Sharon Goldberg
(1)
Stephen Checkoway
(1)
Susanne Engels
(1)
Tanja Lange
(2)
Ted Chinburg
(1)
Thomas Eisenbarth
(2)
Tim Weyrich
(1)
Tobias Hemmert
(1)
Viktor Dukhovni
(1)
William Clarkson
(2)
William Paul
(1)
Yun-An Chang
(1)
Yuval Shavitt
(1)
Yuval Yarom
(4)
Zachary Scherr
(1)
Zakir Durumeric
(2)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to