This POODLE bites: exploiting the SSL 3.0 fallback B Möller, T Duong, K Kotowicz Security Advisory 21, 34-58, 2014 | 339 | 2014 |
Here Come The XOR Ninjas T Duong, J Rizzo Ekoparty, 2011 | 249* | 2011 |
The CRIME Attack J Rizzo, T Duong EKOparty Security Conference 2012, 2012 | 216* | 2012 |
Practical padding oracle attacks J Rizzo, T Duong Proceedings of the 4th USENIX conference on Offensive technologies, WOOT 10, 1-8, 2010 | 92* | 2010 |
Catalic: Delegated PSI cardinality with applications to contact tracing T Duong, DH Phan, N Trieu International Conference on the Theory and Application of Cryptology and …, 2020 | 75 | 2020 |
Cryptography in the web: The case of cryptographic design flaws in asp. net T Duong, J Rizzo 2011 IEEE Symposium on Security and Privacy, 481-489, 2011 | 66 | 2011 |
How to abuse and fix authenticated encryption without key commitment A Albertini, T Duong, S Gueron, S Kölbl, A Luykx, S Schmieg 31st USENIX Security Symposium (USENIX Security 22), 3291-3308, 2022 | 58 | 2022 |
Flickr’s api signature forgery vulnerability T Duong, J Rizzo Tech. Rep., 2009 | 31 | 2009 |
Beast T Duong, J Rizzo Online]. Tersedia: https://vnhacker. blogspot. co. id/2011/09/beast. html, 2011 | 8 | 2011 |
Here come the T Duong, J Rizzo Ninjas, May 13, 2011 | 6* | 2011 |
Zombilizing the browser via flash player 9. talk at the VNSecurity 2007 conference TN Duong | 2 | 2007 |
Privacy-Preserving Digital Vaccine Passport T Duong, J Gao, DH Phan, N Trieu International Conference on Cryptology and Network Security, 137-161, 2023 | 1 | 2023 |