The first collision for full SHA-1

M Stevens, E Bursztein, P Karpman, A Albertini… - Advances in Cryptology …, 2017 - Springer
SHA-1 is a widely used 1995 NIST cryptographic hash function standard that was officially
deprecated by NIST in 2011 due to fundamental security weaknesses demonstrated in …

The most dangerous code in the world: validating SSL certificates in non-browser software

M Georgiev, S Iyengar, S Jana, R Anubhai… - Proceedings of the …, 2012 - dl.acm.org
SSL (Secure Sockets Layer) is the de facto standard for secure Internet communications.
Security of SSL connections against an active network attacker depends on correctly …

Biclique cryptanalysis of the full AES

A Bogdanov, D Khovratovich, C Rechberger - Advances in Cryptology …, 2011 - Springer
Since Rijndael was chosen as the Advanced Encryption Standard (AES), improving upon 7-
round attacks on the 128-bit key variant (out of 10 rounds) or upon 8-round attacks on the …

BLAKE2: simpler, smaller, fast as MD5

JP Aumasson, S Neves, Z Wilcox-O'Hearn… - … and Network Security …, 2013 - Springer
We present the hash function BLAKE2, an improved version of the SHA-3 finalist BLAKE
optimized for speed in software. Target applications include cloud storage, intrusion …

Efficient cache attacks on AES, and countermeasures

E Tromer, DA Osvik, A Shamir - Journal of Cryptology, 2010 - Springer
We describe several software side-channel attacks based on inter-process leakage through
the state of the CPU's memory cache. This leakage reveals memory access patterns, which …

SoK: SSL and HTTPS: Revisiting past challenges and evaluating certificate trust model enhancements

J Clark, PC Van Oorschot - 2013 IEEE Symposium on Security …, 2013 - ieeexplore.ieee.org
Internet users today depend daily on HTTPS for secure communication with sites they intend
to visit. Over the years, many attacks on HTTPS and the certificate trust model it uses have …

The security impact of a new cryptographic library

DJ Bernstein, T Lange, P Schwabe - … , Santiago, Chile, October 7-10, 2012 …, 2012 - Springer
This paper introduces a new cryptographic library, NaCl, and explains how the design and
implementation of the library avoid various types of cryptographic disasters suffered by …

Cryptographic competitions

DJ Bernstein - Journal of Cryptology, 2024 - Springer
Cryptographic Competitions | Journal of Cryptology Skip to main content SpringerLink Account
Menu Find a journal Publish with us Search Cart 1.Home 2.Journal of Cryptology 3.Article …

A hybrid recommendation algorithm adapted in e-learning environments

W Chen, Z Niu, X Zhao, Y Li - World Wide Web, 2014 - Springer
With the rapid development of online learning technology, a huge amount of e-learning
materials have been generated which are highly heterogeneous and in various media …

Using frankencerts for automated adversarial testing of certificate validation in SSL/TLS implementations

C Brubaker, S Jana, B Ray, S Khurshid… - … IEEE Symposium on …, 2014 - ieeexplore.ieee.org
Modern network security rests on the Secure Sockets Layer (SSL) and Transport Layer
Security (TLS) protocols. Distributed systems, mobile and desktop applications, embedded …