Shaanan Cohney
Title
Cited by
Cited by
Year
{DROWN}: Breaking {TLS} Using SSLv2
N Aviram, S Schinzel, J Somorovsky, N Heninger, M Dankel, J Steube, ...
25th {USENIX} Security Symposium ({USENIX} Security 16), 689-706, 2016
1772016
Coin-operated capitalism
S Cohney, D Hoffman, J Sklaroff, D Wishnick
Columbia Law Review 119 (3), 591-676, 2019
922019
A systematic analysis of the Juniper Dual EC incident
S Checkoway, J Maskiewicz, C Garman, J Fried, S Cohney, M Green, ...
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
692016
Factoring as a service
L Valenta, S Cohney, A Liao, J Fried, S Bodduluri, N Heninger
International Conference on Financial Cryptography and Data Security, 321-338, 2016
392016
Measuring small subgroup attacks against Diffie-Hellman.
L Valenta, D Adrian, A Sanso, S Cohney, J Fried, M Hastings, ...
NDSS, 2017
252017
Practical state recovery attacks against legacy RNG implementations
SN Cohney, MD Green, N Heninger
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
92018
Pseudorandom black swans: Cache attacks on ctr_drbg
S Cohney, A Kwong, S Paz, D Genkin, N Heninger, E Ronen, Y Yarom
2020 IEEE Symposium on Security and Privacy (SP), 1241-1258, 2020
52020
Transactional Scripts in Contract Stacks
S Cohney, DA Hoffman
U of Penn, Inst for Law & Econ Research Paper, 2020
22020
Where did i leave my keys? Lessons from the juniper dual ec incident
S Checkoway, J Maskiewicz, C Garman, J Fried, S Cohney, M Green, ...
Communications of the ACM 61 (11), 148-155, 2018
22018
Too Important to Leave to Chance: Pseudorandom Number Generator Standardization & Security
SN Cohney
PQDT-Global, 2019
2019
The system can't perform the operation now. Try again later.
Articles 1–10