Nimrod Aviram
Nimrod Aviram
Verified email at
Cited by
Cited by
{DROWN}: Breaking {TLS} Using SSLv2
N Aviram, S Schinzel, J Somorovsky, N Heninger, M Dankel, J Steube, ...
25th {USENIX} Security Symposium ({USENIX} Security 16), 689-706, 2016
Session resumption protocols and efficient forward security for TLS 1.3 0-RTT
N Aviram, K Gellert, T Jager
Journal of Cryptology 34 (3), 1-57, 2021
Adaptive probing and communication in sensor networks
I Ragoler, Y Matias, N Aviram
International Conference on Ad-Hoc Networks and Wireless, 280-293, 2004
Scalable Scanning and Automatic Classification of {TLS} Padding Oracle Vulnerabilities
R Merget, J Somorovsky, N Aviram, C Young, J Fliegenschmidt, ...
28th {USENIX} Security Symposium ({USENIX} Security 19), 1029-1046, 2019
Raccoon Attack: Finding and Exploiting Most-Significant-Bit-Oracles in TLS-DH (E)
R Merget, M Brinkmann, N Aviram, J Somorovsky, J Mittmann, J Schwenk
30th {USENIX} Security Symposium ({USENIX} Security 21), 2021
Optimizing Dijkstra for real-world performance
N Aviram, Y Shavitt
arXiv preprint arXiv:1505.05033, 2015
The system can't perform the operation now. Try again later.
Articles 1–6