Joshua Fried
TitleCited byYear
A systematic analysis of the Juniper Dual EC incident
S Checkoway, J Maskiewicz, C Garman, J Fried, S Cohney, M Green, ...
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
572016
A kilobit hidden SNFS discrete logarithm computation
J Fried, P Gaudry, N Heninger, E Thomé
Annual International Conference on the Theory and Applications of …, 2017
382017
Factoring as a service
L Valenta, S Cohney, A Liao, J Fried, S Bodduluri, N Heninger
International Conference on Financial Cryptography and Data Security, 321-338, 2016
332016
Weak keys remain widespread in network devices
M Hastings, J Fried, N Heninger
Proceedings of the 2016 Internet Measurement Conference, 49-63, 2016
242016
Measuring Small Subgroup Attacks Against Diffie-Hellman (ePrint)
L Valenta, D Adrian, A Sanso, S Cohney, J Fried, M Hastings, ...
Proc. 24th Network and Distributed Systems Symposium (NDSS ’17), February 2017, 2018
23*2018
Shenango: Achieving High CPU Efficiency for Latency-sensitive Datacenter Workloads
A Ousterhout, J Fried, J Behrens, A Belay, H Balakrishnan
16th {USENIX} Symposium on Networked Systems Design and Implementation …, 2019
222019
Yodel: strong metadata security for voice calls
D Lazar, Y Gilad, N Zeldovich
Proceedings of the 27th ACM Symposium on Operating Systems Principles, 211-224, 2019
32019
Where did i leave my keys? Lessons from the juniper dual ec incident
S Checkoway, J Maskiewicz, C Garman, J Fried, S Cohney, M Green, ...
Communications of the ACM 61 (11), 148-155, 2018
12018
Where did I leave my keys?
S Checkoway, J Maskiewicz, C Garman, J Fried, S Cohney, M Green, ...
2018
The system can't perform the operation now. Try again later.
Articles 1–9