Follow
Nimrod Aviram
Nimrod Aviram
Verified email at mail.tau.ac.il
Title
Cited by
Cited by
Year
{DROWN}: Breaking {TLS} Using {SSLv2}
N Aviram, S Schinzel, J Somorovsky, N Heninger, M Dankel, J Steube, ...
25th USENIX Security Symposium (USENIX Security 16), 689-706, 2016
2532016
Session resumption protocols and efficient forward security for TLS 1.3 0-RTT
N Aviram, K Gellert, T Jager
Journal of Cryptology 34 (3), 1-57, 2021
422021
Scalable scanning and automatic classification of {TLS} padding oracle vulnerabilities
R Merget, J Somorovsky, N Aviram, C Young, J Fliegenschmidt, ...
28th USENIX Security Symposium (USENIX Security 19), 1029-1046, 2019
152019
Raccoon Attack: Finding and Exploiting {Most-Significant-Bit-Oracles} in {TLS-DH (E})
R Merget, M Brinkmann, N Aviram, J Somorovsky, J Mittmann, J Schwenk
30th USENIX Security Symposium (USENIX Security 21), 213-230, 2021
102021
Adaptive probing and communication in sensor networks
I Ragoler, Y Matias, N Aviram
International Conference on Ad-Hoc Networks and Wireless, 280-293, 2004
92004
Optimizing Dijkstra for real-world performance
N Aviram, Y Shavitt
arXiv preprint arXiv:1505.05033, 2015
42015
Practical (Post-Quantum) Key Combiners from One-Wayness and Applications to TLS
N Aviram, B Dowling, I Komargodski, KG Paterson, E Ronen, E Yogev
Cryptology ePrint Archive, 2022
22022
The system can't perform the operation now. Try again later.
Articles 1–7