Follow
Luke Valenta
Luke Valenta
Cloudflare
Verified email at cloudflare.com - Homepage
Title
Cited by
Cited by
Year
Imperfect forward secrecy: How Diffie-Hellman fails in practice
D Adrian, K Bhargavan, Z Durumeric, P Gaudry, M Green, JA Halderman, ...
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
7102015
{DROWN}: Breaking {TLS} Using {SSLv2}
N Aviram, S Schinzel, J Somorovsky, N Heninger, M Dankel, J Steube, ...
25th USENIX Security Symposium (USENIX Security 16), 689-706, 2016
3132016
Blindcoin: Blinded, accountable mixes for bitcoin
L Valenta, B Rowan
Financial Cryptography and Data Security: FC 2015 International Workshops …, 2015
2822015
Post-quantum RSA
DJ Bernstein, N Heninger, P Lou, L Valenta
Post-Quantum Cryptography: 8th International Workshop, PQCrypto 2017 …, 2017
922017
May the fourth be with you: A microarchitectural side channel attack on several real-world applications of curve25519
D Genkin, L Valenta, Y Yarom
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
892017
Alibi routing
D Levin, Y Lee, L Valenta, Z Li, V Lai, C Lumezanu, N Spring, ...
ACM SIGCOMM Computer Communication Review 45 (4), 611-624, 2015
592015
403 forbidden: A global view of cdn geoblocking
A McDonald, M Bernhard, L Valenta, B VanderSloot, W Scott, N Sullivan, ...
Proceedings of the Internet Measurement Conference 2018, 218-230, 2018
562018
Factoring as a service
L Valenta, S Cohney, A Liao, J Fried, S Bodduluri, N Heninger
Financial Cryptography and Data Security: 20th International Conference, FC …, 2017
552017
Measuring small subgroup attacks against Diffie-Hellman
L Valenta, D Adrian, A Sanso, S Cohney, J Fried, M Hastings, ...
Cryptology ePrint Archive, 2016
422016
In search of CurveSwap: Measuring elliptic curve implementations in the wild
L Valenta, N Sullivan, A Sanso, N Heninger
2018 IEEE European Symposium on Security and Privacy (EuroS&P), 384-398, 2018
372018
Toppling top lists: Evaluating the accuracy of popular website lists
K Ruth, D Kumar, B Wang, L Valenta, Z Durumeric
Proceedings of the 22nd ACM Internet Measurement Conference, 374-387, 2022
222022
The TLS post-quantum experiment
K Kwiatkowski, L Valenta
Post on the Cloudflare blog, 2019
182019
Might I get pwned: A second generation compromised credential checking service
B Pal, M Islam, MS Bohuk, N Sullivan, L Valenta, T Whalen, C Wood, ...
31st USENIX Security Symposium (USENIX Security 22), 1831-1848, 2022
142022
Implementing and measuring KEMTLS
S Celi, A Faz-Hernández, N Sullivan, G Tamvada, L Valenta, T Wiggers, ...
International Conference on Cryptology and Information Security in Latin …, 2021
102021
Respect the ORIGIN! a best-case evaluation of connection coalescing in the wild
S Singanamalla, MT Paracha, S Ahmad, J Hoyland, L Valenta, Y Safronov, ...
Proceedings of the 22nd ACM Internet Measurement Conference, 664-678, 2022
22022
Measuring And Securing Cryptographic Deployments
L Valenta
University of Pennsylvania, 2019
12019
Global, Passive Detection of Connection Tampering
R Sundara Raman, LH Merino, K Bock, M Fayed, D Levin, N Sullivan, ...
Proceedings of the ACM SIGCOMM 2023 Conference, 622-636, 2023
2023
May the Fourth Be With You
D Genkin, L Valenta, Y Yarom
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
2017
Blinded, Accountable Mixes for Bitcoin
L Valenta, B Rowan
exchange 24, 34, 0
Implementing and Measuring KEMTLS
G Tamvada, L Valenta, T Wiggers, B Westerbaan, CA Wood
Progress in Cryptology–LATINCRYPT 2021, 88, 0
The system can't perform the operation now. Try again later.
Articles 1–20