Author of the publication

Revisiting SSL/TLS Implementations: New Bleichenbacher Side Channels and Attacks.

, , , , , and . USENIX Security Symposium, page 733-748. USENIX Association, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Blur: The speed of change in the connected economy, and . Addison-Wesley, Reading, MA, (1998)SoK: Lessons Learned from SSL/TLS Attacks., and . WISA, volume 8267 of Lecture Notes in Computer Science, page 189-209. Springer, (2013)The Global Genome Biodiversity Network (GGBN) Data Standard specification., , , , , , , , , and 25 other author(s). Database J. Biol. Databases Curation, (2016)Lessons Learned From Previous SSL/TLS Attacks - A Brief Chronology Of Attacks And Weaknesses., and . IACR Cryptology ePrint Archive, (2013)Randomly Failed! The State of Randomness in Current Java Implementations., , and . CT-RSA, volume 7779 of Lecture Notes in Computer Science, page 129-144. Springer, (2013)An introduction to complexity and business.. Complex., 3 (4): 21-22 (1998)Positive Delta Detection for Alpha Shape Segmentation of 3D Ultrasound Images of Pathologic Kidneys., , , , and . MICCAI (3), volume 9351 of Lecture Notes in Computer Science, page 711-718. Springer, (2015)Analysis and visualization of Arabidopsis thaliana GWAS using web 2.0 technologies., , , , , , , , , and . Database J. Biol. Databases Curation, (2011)Exploring Aural Navigation by Screenless Access., , , and . W4A, page 27:1-27:10. ACM, (2018)BigTop: a three-dimensional virtual reality tool for GWAS visualization., , and . BMC Bioinform., 21 (1): 39 (2020)