Lest we remember: cold-boot attacks on encryption keys JA Halderman, SD Schoen, N Heninger, W Clarkson, W Paul, ... Communications of the ACM 52 (5), 91-98, 2009 | 1857 | 2009 |
Cypherpunks: Freedom and the Future of the Internet J Assange, J Appelbaum, A Müller-Maguhn, J Zimmerman ORBooks, 2012 | 353* | 2012 |
Short chosen-prefix collisions for MD5 and the creation of a rogue CA certificate M Stevens, A Sotirov, J Appelbaum, A Lenstra, D Molnar, DA Osvik, ... Advances in Cryptology-CRYPTO 2009: 29th Annual International Cryptology …, 2009 | 308 | 2009 |
MD5 considered harmful today, creating a rogue CA certificate A Sotirov, M Stevens, J Appelbaum, AK Lenstra, D Molnar, DA Osvik, ... 25th Annual Chaos Communication Congress, 2008 | 189 | 2008 |
OONI: open observatory of network interference. A Filasto, J Appelbaum FOCI, 2012 | 154 | 2012 |
Shopping for spy gear: Catalog advertises NSA toolbox JR Appelbaum, J Horchert, C Stöcker Der Spiegel, 2013 | 44 | 2013 |
vpwns: Virtual pwned networks J Appelbaum, M Ray, K Koscher, I Finder 2nd USENIX Workshop on Free and Open Communications on the Internet. USENIX …, 2012 | 31 | 2012 |
The". onion" special-use domain name J Appelbaum, A Muffett | 29 | 2015 |
Toward secure name resolution on the internet C Grothoff, M Wachs, M Ermert, J Appelbaum Computers & Security 77, 694-708, 2018 | 28 | 2018 |
Pluggable transports for circumvention J Appelbaum, N Mathewson October, 2010 | 16 | 2010 |
Tiny wireguard tweak J Appelbaum, C Martindale, P Wu Progress in Cryptology–AFRICACRYPT 2019: 11th International Conference on …, 2019 | 14 | 2019 |
NSA’s MORECOWBELL: knell for DNS C Grothoff, M Wachs, M Ermert, J Appelbaum Unpublished technical report, 2017 | 14 | 2017 |
Menace sur nos libertés: comment Internet nous surveille, comment résister J Assange, J Appelbaum, A Müller-Maguhn, J Zimmermann R. Laffont, 2013 | 14 | 2013 |
ABOUT ARTISTS J Appelbaum, Z Blas | 13 | 1955 |
Prying eyes: inside the NSA's war on internet security JR Appelbaum, A Gibson, C Grothoff, A Müller-Maghun, L Poitras, ... Der Spiegel, 2014 | 12 | 2014 |
Inside TAO: documents reveal top NSA hacking unit JR Appelbaum, L Poitras, M Rosenbach, C Stöcker, J Schindler, H Stark Der Spiegel, 2013 | 12 | 2013 |
How governments have tried to block Tor R Dingledine, J Appelbaum 28th Chaos Communication Congress, 2012 | 11 | 2012 |
Unlocking FileVault: an analysis of Apple’s disk encryption system A Jacob, W Ralf-Philipp 23rd chaos communication congress, Berlin; December, 2006 | 11 | 2006 |
NSA targets the privacy-conscious JR Appelbaum, A Gibson, J Goetz, V Kabisch, L Kampf, L Ryge | 8 | 2014 |
Technical analysis of the Ultrasurf proxying software J Appelbaum The Tor Project, 2012 | 8 | 2012 |