Follow
Emilia Kasper
Emilia Kasper
Software engineer, Google
Verified email at google.com
Title
Cited by
Cited by
Year
Certificate transparency
B Laurie
Communications of the ACM 57 (10), 40-46, 2014
5762014
Faster and timing-attack resistant AES-GCM
E Käsper, P Schwabe
Cryptographic Hardware and Embedded Systems-CHES 2009: 11th International …, 2009
3272009
{DROWN}: Breaking {TLS} using sslv2
N Aviram, S Schinzel, J Somorovsky, N Heninger, M Dankel, J Steube, ...
25th {USENIX} Security Symposium ({USENIX} Security 16), 689-706, 2016
2632016
{DROWN}: Breaking {TLS} using sslv2
N Aviram, S Schinzel, J Somorovsky, N Heninger, M Dankel, J Steube, ...
25th {USENIX} Security Symposium ({USENIX} Security 16), 689-706, 2016
2632016
Fast elliptic curve cryptography in OpenSSL
E Käsper
Financial Cryptography and Data Security: FC 2011 Workshops, RLCPS and WECSR …, 2012
872012
Revocation transparency
B Laurie, E Kasper
Google Research, September 33, 2012
852012
Multilingual and cross-lingual news topic tracking
B Pouliquen, R Steinberger, C Ignat, E Käsper, I Temnikova
COLING 2004: Proceedings of the 20th International Conference on …, 2004
722004
RFC 6962: Certificate transparency
B Laurie, A Langley, E Kasper
RFC Editor, 2013
572013
The LANE hash function
S Indesteege, E Andreeva, C De Canniere, O Dunkelman, E Käsper, ...
Dagstuhl Seminar Proceedings, 2009
392009
Certificate transparency
A Langley, E Kasper, B Laurie
Internet Engineering Task Force, 2013
302013
Distinguishers for the Compression Function and Output Transformation of Hamsi-256.
JP Aumasson, E Käsper, LR Knudsen, K Matusiewicz, RS Ødegård, ...
ACISP 10, 87-103, 2010
302010
Correlated Keystreams in Moustique
E Käsper, V Rijmen, TE Bjørstad, C Rechberger, M Robshaw, G Sekar
Progress in Cryptology–AFRICACRYPT 2008: First International Conference on …, 2008
292008
Certificate transparency version 2.0
B Laurie, A Langley, E Kasper, E Messeri, R Stradling
Internet Engineering Task Force RFC 9162, 2021
272021
The Wisdom of Crowds: Attacks and Optimal Constructions.
G Danezis, C Diaz, E Käsper, C Troncoso
ESORICS, 406-423, 2009
222009
Strongly Multiplicative Hierarchical Threshold Secret Sharing.
E Käsper, V Nikov, S Nikova
ICITS, 148-168, 2007
222007
Efficient negative databases from cryptographic hash functions
G Danezis, C Diaz, S Faust, E Käsper, C Troncoso, B Preneel
Information Security: 10th International Conference, ISC 2007, Valparaíso …, 2007
222007
Certificate Transparency v2. 1a
B Laurie, E Kasper
Links. org, September, 2012
172012
Certificate authority transparency and auditability
B Laurie, A Langley, E Kasper
ØØÔ»» ÛÛۺРÒ× ºÓÖ» Ð×» ÖØ Ø ÙØ ÓÖ ØÝÌÖ Ò× Ô Ö Ò Ý Ò Ù Ø Ð ØÝºÔ, 124, 2011
152011
The LANE hash function. Submission to NIST (2008)
S Indesteege, E Andreeva, C De Canniere, O Dunkelman, E Käsper, ...
14
Revocation transparency (2012)
B Laurie, E Kasper
URL http://sump2. links. org/files/RevocationTransparency. pdf, 2014
122014
The system can't perform the operation now. Try again later.
Articles 1–20