Peek-a-Boo, I Still See You: Why Efficient Traffic Analysis Countermeasures Fail KP Dyer, SE Coull, T Ristenpart, T Shrimpton IEEE Symposium on Security and Privacy 2012, 2012 | 664 | 2012 |
Protocol misidentification made easy with format-transforming encryption KP Dyer, SE Coull, T Ristenpart, T Shrimpton Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013 | 182 | 2013 |
Marionette: A programmable network traffic obfuscation system KP Dyer, SE Coull, T Shrimpton 24th USENIX Security Symposium (USENIX Security 15), 367-382, 2015 | 166* | 2015 |
Traffic analysis of encrypted messaging services: Apple imessage and beyond SE Coull, KP Dyer ACM SIGCOMM Computer Communication Review 44 (5), 5-11, 2014 | 148 | 2014 |
Seeing through network-protocol obfuscation L Wang, KP Dyer, A Akella, T Ristenpart, T Shrimpton Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015 | 141 | 2015 |
LibFTE: A Toolkit for Constructing Practical, Format-Abiding Encryption Schemes D Luchaup, KP Dyer, S Jha, T Ristenpart, T Shrimpton USENIX Security 2014, 2014 | 39 | 2014 |
Novel Cryptographic Primitives and Protocols for Censorship Resistance KP Dyer Portland State University, 2015 | | 2015 |
Cryptanalysis of the SHA Family of Hash Functions KP Dyer Royal Holloway, University of London, 2007 | | 2007 |
Linear cryptanalysis of two round 16 step MD5 over the rationals KP Dyer, EF Schaefer Southern Africa Mathematical Sciences Association, 2005, 2005 | | 2005 |