• 533 Citations
20082019

Research output per year

If you made any changes in Pure these will be visible here soon.

Research Output

Filter
Conference contribution
2019

Tiny wireguard tweak

Appelbaum, J. R., Martindale, C. R. & Wu, S. P., 1 Jan 2019, Progress in Cryptology – AFRICACRYPT 2019 - 11th International Conference on Cryptology in Africa, Proceedings. Nitaj, A., Rachidi, T. & Buchmann, J. (eds.). Cham: Springer, p. 3-20 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11627 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

2018

Towards secure name resolution on the internet

Grothoff, C., Wachs, M., Ermert, M. & Appelbaum, J., 2018, NDSS 2017 DNS Privacy Workshop DPRIV17 '17. p. 1-20

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

2012

High stakes : designing a privacy preserving registry

Czeskis, A. & Appelbaum, J., 2012, Financial Cryptography and Data Security - FC 2012 Workshops, USEC and WECSR 2012, Kralendijk, Bonaire, March 2, 2012, Revised Selected Papers. Blythe, J., Dietrich, S. & Jean Camp, L. (eds.). Heidelberg: Springer, p. 27-43 17 p. (Lecture Notes in Computer Science; vol. 7398).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

OONI : Open Observatory of Network Interference

Filastò, A. & Appelbaum, J., 2012, 2nd USENIX Workshop on Free and Open Communications on the Internet, FOCI '12, Bellevue, WA, USA, August 6, 2012. 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Vpwns : Virtual Pwned Networks

Appelbaum, J., Ray, M., Koscher, K. & Finder, I., 2012, 2nd USENIX Workshop on Free and Open Communications on the Internet, FOCI '12, Bellevue, WA, USA, August 6, 2012. 7 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Open Access
File
48 Downloads (Pure)
2009

Short chosen-prefix collisions for MD5 and the creation of a rogue CA certificate

Stevens, M. M. J., Sotirov, A., Appelbaum, J. R., Lenstra, A. K., Molnar, D., Osvik, D. A. & Weger, de, B. M. M., 2009, Advances in Cryptology - CRYPTO 2009 (29th Annual International Cryptology Conference, Santa Barbara CA, USA, August 16-20, 2009. Proceedings). Halevi, S. (ed.). Berlin: Springer, p. 55-69 (Lecture Notes in Computer Science; vol. 5677).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Open Access
File
93 Citations (Scopus)
90 Downloads (Pure)
2008

Lest we remember : cold boot attacks on encryption keys

Halderman, J. A., Schoen, S. D., Heninger, N., Clarkson, W., Paul, W., Calandrino, J. A., Feldman, A. J., Appelbaum, J. & Felten, E. W., 2008, Proceedings of the 17th USENIX Security Symposium, July 28-August 1, 2008, San Jose, CA, USA. p. 45-60 16 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Open Access