| Certificate transparency B Laurie Communications of the ACM 57 (10), 40-46, 2014 | 869 | 2014 |
| Faster and timing-attack resistant AES-GCM E Käsper, P Schwabe International Workshop on Cryptographic Hardware and Embedded Systems, 1-17, 2009 | 388 | 2009 |
| {DROWN}: breaking {TLS} using {SSLv2} N Aviram, S Schinzel, J Somorovsky, N Heninger, M Dankel, J Steube, ... 25th USENIX Security Symposium (USENIX Security 16), 689-706, 2016 | 347 | 2016 |
| Revocation transparency B Laurie, E Kasper Google Research, September 33, 2012 | 113 | 2012 |
| Certificate transparency version 2.0 B Laurie, A Langley, E Kasper, E Messeri, R Stradling Internet Requests for Comments, RFC Editor, RFC 9162, 2021 | 104 | 2021 |
| Fast elliptic curve cryptography in OpenSSL E Käsper International Conference on Financial Cryptography and Data Security, 27-39, 2011 | 98 | 2011 |
| Multilingual and cross-lingual news topic tracking B Pouliquen, R Steinberger, C Ignat, E Käsper, I Temnikova COLING 2004: Proceedings of the 20th International Conference on …, 2004 | 77 | 2004 |
| The LANE hash function S Indesteege, E Andreeva, C De Canniere, O Dunkelman, E Käsper, ... Schloss Dagstuhl–Leibniz-Zentrum für Informatik, 2009 | 42 | 2009 |
| Certificate transparency A Langley, E Kasper, B Laurie Internet Engineering Task Force, 2013 | 40 | 2013 |
| Correlated Keystreams in Moustique E Käsper, V Rijmen, TE Bjørstad, C Rechberger, M Robshaw, G Sekar International Conference on Cryptology in Africa, 246-257, 2008 | 31 | 2008 |
| Distinguishers for the compression function and output transformation of Hamsi-256 JP Aumasson, E Käsper, LR Knudsen, K Matusiewicz, R Ødegård, ... Australasian Conference on Information Security and Privacy, 87-103, 2010 | 29 | 2010 |
| Strongly multiplicative hierarchical threshold secret sharing E Käsper, V Nikov, S Nikova International Conference on Information Theoretic Security, 148-168, 2007 | 26 | 2007 |
| Certificate transparency (RFC 6962) B Laurie, A Langley, E Kasper IETF RCFs, 2013 | 24 | 2013 |
| The wisdom of Crowds: attacks and optimal constructions G Danezis, C Diaz, E Käsper, C Troncoso European Symposium on Research in Computer Security, 406-423, 2009 | 23 | 2009 |
| Efficient negative databases from cryptographic hash functions G Danezis, C Diaz, S Faust, E Käsper, C Troncoso, B Preneel International Conference on Information Security, 423-436, 2007 | 23 | 2007 |
| Certificate Transparency v2. 1a B Laurie, E Kasper Links. org, September, 2012 | 15 | 2012 |
| Certificate authority transparency and auditability B Laurie, A Langley, E Kasper ØØÔ»» ÛÛۺРÒ× ºÓÖ» Ð×» ÖØ Ø ÙØ ÓÖ ØÝÌÖ Ò× Ô Ö Ò Ý Ò Ù Ø Ð ØÝºÔ, 124, 2011 | 15 | 2011 |
| The LANE hash function. Submission to NIST, 2008 S Indesteege, E Andreeva, C De Canniere, O Dunkelman, E Käsper, ... | 14 | |
| RFC 6962: Certificate transparency B Laurie, A Langley, E Kasper 2013, 0 | 12 | |
| Revocation transparency (2012) B Laurie, E Kasper URL http://sump2. links. org/files/RevocationTransparency. pdf, 0 | 12 | |