Follow
Luke Valenta
Luke Valenta
Cloudflare
Verified email at cloudflare.com - Homepage
Title
Cited by
Cited by
Year
Imperfect forward secrecy: How Diffie-Hellman fails in practice
D Adrian, K Bhargavan, Z Durumeric, P Gaudry, M Green, JA Halderman, ...
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
6682015
{DROWN}: Breaking {TLS} using sslv2
N Aviram, S Schinzel, J Somorovsky, N Heninger, M Dankel, J Steube, ...
25th {USENIX} Security Symposium ({USENIX} Security 16), 689-706, 2016
2782016
Blindcoin: Blinded, accountable mixes for bitcoin
L Valenta, B Rowan
Financial Cryptography and Data Security: FC 2015 International Workshops …, 2015
2602015
May the fourth be with you: A microarchitectural side channel attack on several real-world applications of curve25519
D Genkin, L Valenta, Y Yarom
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
822017
Post-quantum RSA
DJ Bernstein, N Heninger, P Lou, L Valenta
Post-Quantum Cryptography: 8th International Workshop, PQCrypto 2017 …, 2017
802017
Factoring as a service
L Valenta, S Cohney, A Liao, J Fried, S Bodduluri, N Heninger
Financial Cryptography and Data Security: 20th International Conference, FC …, 2017
542017
Alibi routing
D Levin, Y Lee, L Valenta, Z Li, V Lai, C Lumezanu, N Spring, ...
ACM SIGCOMM Computer Communication Review 45 (4), 611-624, 2015
522015
403 forbidden: A global view of cdn geoblocking
A McDonald, M Bernhard, L Valenta, B VanderSloot, W Scott, N Sullivan, ...
Proceedings of the Internet Measurement Conference 2018, 218-230, 2018
492018
Measuring small subgroup attacks against Diffie-Hellman
L Valenta, D Adrian, A Sanso, S Cohney, J Fried, M Hastings, ...
Cryptology ePrint Archive, 2016
372016
In search of CurveSwap: Measuring elliptic curve implementations in the wild
L Valenta, N Sullivan, A Sanso, N Heninger
2018 IEEE European Symposium on Security and Privacy (EuroS&P), 384-398, 2018
292018
Might i get pwned: A second generation compromised credential checking service
B Pal, M Islam, MS Bohuk, N Sullivan, L Valenta, T Whalen, C Wood, ...
31st USENIX Security Symposium (USENIX Security 22), 1831-1848, 2022
72022
Implementing and measuring KEMTLS
S Celi, A Faz-Hernández, N Sullivan, G Tamvada, L Valenta, T Wiggers, ...
Progress in Cryptology–LATINCRYPT 2021: 7th International Conference on …, 2021
72021
Toppling top lists: Evaluating the accuracy of popular website lists
K Ruth, D Kumar, B Wang, L Valenta, Z Durumeric
Proceedings of the 22nd ACM Internet Measurement Conference, 374-387, 2022
52022
Measuring And Securing Cryptographic Deployments
L Valenta
University of Pennsylvania, 2019
12019
Respect the ORIGIN! a best-case evaluation of connection coalescing in the wild
S Singanamalla, MT Paracha, S Ahmad, J Hoyland, L Valenta, Y Safronov, ...
Proceedings of the 22nd ACM Internet Measurement Conference, 664-678, 2022
2022
May the Fourth Be With You
D Genkin, L Valenta, Y Yarom
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
2017
Blinded, Accountable Mixes for Bitcoin
L Valenta, B Rowan
exchange 24, 34, 0
Implementing and Measuring KEMTLS
G Tamvada, L Valenta, T Wiggers, B Westerbaan, CA Wood
Progress in Cryptology–LATINCRYPT 2021, 88, 0
The LOGJAM attack
IF Secrecy, D Adrian, K Bhargavan, Z Durumeric, P Gaudry, M Green, ...
The system can't perform the operation now. Try again later.
Articles 1–19