Luke Valenta

Orcid: 0000-0001-8936-0499

According to our database1, Luke Valenta authored at least 15 papers between 2015 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Global, Passive Detection of Connection Tampering.
Proceedings of the ACM SIGCOMM 2023 Conference, 2023

2022
Might I Get Pwned: A Second Generation Compromised Credential Checking Service.
Proceedings of the 31st USENIX Security Symposium, 2022

Respect the ORIGIN!: a best-case evaluation of connection coalescing in the wild.
Proceedings of the 22nd ACM Internet Measurement Conference, 2022

Toppling top lists: evaluating the accuracy of popular website lists.
Proceedings of the 22nd ACM Internet Measurement Conference, 2022

2021
Implementing and Measuring KEMTLS.
Proceedings of the Progress in Cryptology - LATINCRYPT 2021, 2021

2018
403 Forbidden: A Global View of CDN Geoblocking.
Proceedings of the Internet Measurement Conference 2018, 2018

In Search of CurveSwap: Measuring Elliptic Curve Implementations in the Wild.
Proceedings of the 2018 IEEE European Symposium on Security and Privacy, 2018

2017
Post-quantum RSA.
Proceedings of the Post-Quantum Cryptography - 8th International Workshop, 2017

Measuring small subgroup attacks against Diffie-Hellman.
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017

May the Fourth Be With You: A Microarchitectural Side Channel Attack on Several Real-World Applications of Curve25519.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

2016

Factoring as a Service.
Proceedings of the Financial Cryptography and Data Security, 2016

2015
Alibi Routing.
Proceedings of the 2015 ACM Conference on Special Interest Group on Data Communication, 2015

Blindcoin: Blinded, Accountable Mixes for Bitcoin.
Proceedings of the Financial Cryptography and Data Security, 2015

Imperfect Forward Secrecy: How Diffie-Hellman Fails in Practice.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015


  Loading...