Follow
Kevin P. Dyer
Kevin P. Dyer
Verified email at google.com - Homepage
Title
Cited by
Cited by
Year
Peek-a-Boo, I Still See You: Why Efficient Traffic Analysis Countermeasures Fail
KP Dyer, SE Coull, T Ristenpart, T Shrimpton
IEEE Symposium on Security and Privacy 2012, 2012
6352012
Protocol misidentification made easy with format-transforming encryption
KP Dyer, SE Coull, T Ristenpart, T Shrimpton
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
1792013
{CellIQ}:{Real-Time} Cellular Network Analytics at Scale
A Iyer, LE Li, I Stoica
12th USENIX Symposium on Networked Systems Design and Implementation (NSDI …, 2015
160*2015
Traffic analysis of encrypted messaging services: Apple imessage and beyond
SE Coull, KP Dyer
ACM SIGCOMM Computer Communication Review 44 (5), 5-11, 2014
1432014
Seeing through network-protocol obfuscation
L Wang, KP Dyer, A Akella, T Ristenpart, T Shrimpton
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
1362015
LibFTE: A Toolkit for Constructing Practical, Format-Abiding Encryption Schemes
D Luchaup, KP Dyer, S Jha, T Ristenpart, T Shrimpton
USENIX Security 2014, 2014
392014
Novel Cryptographic Primitives and Protocols for Censorship Resistance
KP Dyer
Portland State University, 2015
2015
Cryptanalysis of the SHA Family of Hash Functions
KP Dyer
Royal Holloway, University of London, 2007
2007
Linear cryptanalysis of two round 16 step MD5 over the rationals
KP Dyer, EF Schaefer
Southern Africa Mathematical Sciences Association, 2005, 2005
2005
The system can't perform the operation now. Try again later.
Articles 1–9