Nadia Heninger

Orcid: 0000-0002-7904-7295

Affiliations:
  • University of Pennsylvania, Philadelphia, PA, USA
  • University of California, San Diego, USA


According to our database1, Nadia Heninger authored at least 58 papers between 2006 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
No Key, No Problem: Vulnerabilities in Master Lock Smart Locks.
Proceedings of the 19th USENIX WOOT Conference on Offensive Technologies, 2025

Don't Look Up: There Are Sensitive Internal Links in the Clear on GEO Satellites.
Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security, 2025

2024
On the Semidirect Discrete Logarithm Problem in Finite Groups.
IACR Cryptol. ePrint Arch., 2024

Survey: Recovering cryptographic keys from partial information, by example.
IACR Commun. Cryptol., 2024

RADIUS/UDP Considered Harmful.
Proceedings of the 33rd USENIX Security Symposium, 2024

Abuse-Resistant Location Tracking: Balancing Privacy and Safety in the Offline Finding Ecosystem.
Proceedings of the 33rd USENIX Security Symposium, 2024

On the Possibility of a Backdoor in the Micali-Schnorr Generator.
Proceedings of the Public-Key Cryptography - PKC 2024, 2024

On the Semidirect Discrete Logarithm Problem in Finite Groups.
Proceedings of the Advances in Cryptology - ASIACRYPT 2024, 2024

2023
The Hidden Number Problem with Small Unknown Multipliers: Cryptanalyzing MEGA in Six Queries and Other Applications.
Proceedings of the Public-Key Cryptography - PKC 2023, 2023

Fast Practical Lattice Reduction Through Iterated Compression.
Proceedings of the Advances in Cryptology - CRYPTO 2023, 2023

Passive SSH Key Compromise via Lattices.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

The Curious Case of the Half-Half Bitcoin ECDSA Nonces.
Proceedings of the Progress in Cryptology - AFRICACRYPT 2023, 2023

2022
The State of the Art in Integer Factoring and Breaking Public-Key Cryptography.
IEEE Secur. Priv., 2022

Cryptanalyzing MEGA in Six Queries.
IACR Cryptol. ePrint Arch., 2022

RSA, DH, and DSA in the Wild.
IACR Cryptol. ePrint Arch., 2022

Open to a fault: On the passive compromise of TLS keys via transient errors.
Proceedings of the 31st USENIX Security Symposium, 2022

2021
On Bounded Distance Decoding with Predicate: Breaking the "Lattice Barrier" for the Hidden Number Problem.
Proceedings of the Advances in Cryptology - EUROCRYPT 2021, 2021

2020
Recovering cryptographic keys from partial information, by example.
IACR Cryptol. ePrint Arch., 2020

Properties of constacyclic codes under the Schur product.
Des. Codes Cryptogr., 2020

CopyCat: Controlled Instruction-Level Attacks on Enclaves for Maximal Key Extraction.
CoRR, 2020

TPM-FAIL: TPM meets Timing and Lattice Attacks.
Proceedings of the 29th USENIX Security Symposium, 2020

CopyCat: Controlled Instruction-Level Attacks on Enclaves.
Proceedings of the 29th USENIX Security Symposium, 2020

Pseudorandom Black Swans: Cache Attacks on CTR_DRBG.
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020

Comparing the Difficulty of Factorization and Discrete Logarithm: A 240-Digit Experiment.
Proceedings of the Advances in Cryptology - CRYPTO 2020, 2020

2019
Short Paper: The Proof is in the Pudding - Proofs of Work for Solving Discrete Logarithms.
Proceedings of the Financial Cryptography and Data Security, 2019

Biased Nonce Sense: Lattice Attacks Against Weak ECDSA Signatures in Cryptocurrencies.
Proceedings of the Financial Cryptography and Data Security, 2019

2018
CacheQuote: Efficiently Recovering Long-term Secrets of SGX EPID via Cache Attacks.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2018

Characterizing overstretched NTRU attacks.
IACR Cryptol. ePrint Arch., 2018

The Proof is in the Pudding: Proofs of Work for Solving Discrete Logarithms.
IACR Cryptol. ePrint Arch., 2018

Where did I leave my keys?: lessons from the Juniper Dual EC incident.
Commun. ACM, 2018

In Search of CurveSwap: Measuring Elliptic Curve Implementations in the Wild.
Proceedings of the 2018 IEEE European Symposium on Security and Privacy, 2018

Practical State Recovery Attacks against Legacy RNG Implementations.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

2017
Post-quantum RSA.
Proceedings of the Post-Quantum Cryptography - 8th International Workshop, 2017

Measuring small subgroup attacks against Diffie-Hellman.
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017

A Kilobit Hidden SNFS Discrete Logarithm Computation.
Proceedings of the Advances in Cryptology - EUROCRYPT 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30, 2017

Sliding Right into Disaster: Left-to-Right Sliding Windows Leak.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2017, 2017

2016
A Systematic Analysis of the Juniper Dual EC Incident.
IACR Cryptol. ePrint Arch., 2016


Weak Keys Remain Widespread in Network Devices.
Proceedings of the 2016 ACM on Internet Measurement Conference, 2016

Factoring as a Service.
Proceedings of the Financial Cryptography and Data Security, 2016

CacheBleed: A Timing Attack on OpenSSL Constant Time RSA.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2016, 2016

A Systematic Analysis of the Juniper Dual EC Incident.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

Cryptographic Applications of Capacity Theory: On the Optimality of Coppersmith's Method for Univariate Polynomials.
Proceedings of the Advances in Cryptology - ASIACRYPT 2016, 2016

2015
Imperfect Forward Secrecy: How Diffie-Hellman Fails in Practice.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

2014
Elliptic Curve Cryptography in Practice.
Proceedings of the Financial Cryptography and Data Security, 2014

2013
Factoring RSA Keys from Certified Smart Cards: Coppersmith in the Wild.
Proceedings of the Advances in Cryptology - ASIACRYPT 2013, 2013

2012
Torchestra: reducing interactive traffic delays over tor.
Proceedings of the 11th annual ACM Workshop on Privacy in the Electronic Society, 2012

Mining Your Ps and Qs: Detection of Widespread Weak Keys in Network Devices.
Proceedings of the 21th USENIX Security Symposium, Bellevue, WA, USA, August 8-10, 2012, 2012

Optimally Robust Private Information Retrieval.
Proceedings of the 21th USENIX Security Symposium, Bellevue, WA, USA, August 8-10, 2012, 2012

2011
Cold-Boot Attacks.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Approximate common divisors via lattices.
IACR Cryptol. ePrint Arch., 2011

Ideal forms of Coppersmith's theorem and Guruswami-Sudan list decoding.
Proceedings of the Innovations in Computer Science, 2011

2010
Computational Complexity and Information Asymmetry in Election Audits with Low-Entropy Randomness.
Proceedings of the 2010 Electronic Voting Technology Workshop / Workshop on Trustworthy Elections, 2010

Defeating Vanish with Low-Cost Sybil Attacks Against Large DHTs.
Proceedings of the Network and Distributed System Security Symposium, 2010

2009
Fingerprinting Blank Paper Using Commodity Scanners.
Proceedings of the 30th IEEE Symposium on Security and Privacy (SP 2009), 2009

Reconstructing RSA Private Keys from Random Key Bits.
Proceedings of the Advances in Cryptology, 2009

2008
Lest We Remember: Cold Boot Attacks on Encryption Keys.
Proceedings of the 17th USENIX Security Symposium, 2008

2006
On the integrality of <i>n</i>th roots of generating functions.
J. Comb. Theory A, 2006


  Loading...