Here come the⊕ ninjas T Duong, J Rizzo Unpublished manuscript 320, 2011 | 187 | 2011 |
The CRIME attack J Rizzo, T Duong ekoparty security conference 2012, 2012 | 125 | 2012 |
Practical padding oracle attacks J Rizzo, T Duong 4th USENIX Workshop on Offensive Technologies (WOOT 10), 2010 | 81 | 2010 |
Cryptography in the web: The case of cryptographic design flaws in asp. net T Duong, J Rizzo 2011 IEEE Symposium on Security and Privacy, 481-489, 2011 | 64 | 2011 |
The CRIME attack T Duong, J Rizzo Presentation at ekoparty Security Conference 110, 2012 | 48 | 2012 |
Flickr’s api signature forgery vulnerability T Duong, J Rizzo Tech. Rep., 2009 | 29 | 2009 |
Here come the⊕ ninjas, 2011 T Duong, J Rizzo See also en. wikipedia. org/wiki/Transport_Layer_Security# BEAST_attack, 2011 | 18 | 2011 |
Crime: Compression ratio info-leak made easy J Rizzo, T Duong ekoparty Security Conference, 2012 | 13 | 2012 |
Here come the XOR ninjas J Rizzo, T Duong Unpublished manuscript, 2011 | 13 | 2011 |
Beast T Duong, J Rizzo Online]. Tersedia: https://vnhacker. blogspot. co. id/2011/09/beast. html, 2011 | 8 | 2011 |
Here come the xor ninjas, 2011 T Duong, J Rizzo Unpublished manuscript.(Cited on page 9), 0 | 8 | |
Vot. Ar: una mala elección F Amato, I Barrera, E Chaparro, S Demian, A Ortega, J Rizzo, N Waisman Recuperado de: https://github. com/HacKanCuBa/informe-votar/blob/master …, 2015 | 7 | 2015 |
Here come the T Duong, J Rizzo Ninjas, May 13, 2011 | 7* | 2011 |
BEAST-Here Come The XOR Ninjas T Duong, J Rizzo | 7 | 2011 |
The CRIME attack, 2012 J Rizzo, T Duong URL http://goo. gl/mlw1X1. Presented at ekoparty 12, 2015 | 6 | 2015 |
BEAST: Surprising crypto attack against HTTPS T Duong, J Rizzo Blog, September 42, 45-47, 2011 | 5 | 2011 |
BEAST: Surprising crypto attack against https J Rizzo, T Duong EKOPARTY security conference 7th edition, 2011 | 5 | 2011 |
Padding oracles everywhere T Duong, J Rizzo EKOPARTY, 2010 | 5 | 2010 |
Practical padding oracle attacks T Duong, J Rizzo Black Hat Europe, 2010 | 4 | 2010 |
Flickr's API Signature Forgery Vulnerability Remotely Exploitable: Yes API Flickr's, T Duong, J Rizzo | | 2009 |