default search action
Eric Rescorla
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [i40]Justin Uberti, Cullen Jennings, Eric Rescorla:
JavaScript Session Establishment Protocol (JSEP). RFC 9429: 1-86 (2024) - 2023
- [i39]Richard Barnes, Subodh Iyengar, Nick Sullivan, Eric Rescorla:
Delegated Credentials for TLS and DTLS. RFC 9345: 1-17 (2023) - [i38]David Schinazi, Eric Rescorla:
Compatible Version Negotiation for QUIC. RFC 9368: 1-15 (2023) - 2022
- [i37]Eric Rescorla, Hannes Tschofenig, Thomas Fossati, Achim Kraus:
Connection Identifier for DTLS 1.2. RFC 9146: 1-14 (2022) - [i36]Eric Rescorla, Hannes Tschofenig, Nagendra Modadugu:
The Datagram Transport Layer Security (DTLS) Protocol Version 1.3. RFC 9147: 1-61 (2022) - 2021
- [i35]Eric Rescorla, Jon Peterson:
Secure Telephone Identity Revisited (STIR) Out-of-Band Architecture and Use Cases. RFC 8816: 1-24 (2021) - [i34]Eric Rescorla:
Security Considerations for WebRTC. RFC 8826: 1-21 (2021) - [i33]Eric Rescorla:
WebRTC Security Architecture. RFC 8827: 1-35 (2021) - [i32]Justin Uberti, Cullen Jennings, Eric Rescorla:
JavaScript Session Establishment Protocol (JSEP). RFC 8829: 1-95 (2021) - [i31]Martin Thomson, Eric Rescorla:
Unknown Key-Share Attacks on Uses of TLS with the Session Description Protocol (SDP). RFC 8844: 1-17 (2021) - 2020
- [i30]Joel M. Halpern, Eric Rescorla:
IETF Stream Documents Require IETF Rough Consensus. RFC 8789: 1-4 (2020)
2010 – 2019
- 2019
- [c15]Josh Aas, Richard Barnes, Benton Case, Zakir Durumeric, Peter Eckersley, Alan Flores-López, J. Alex Halderman, Jacob Hoffman-Andrews, James Kasten, Eric Rescorla, Seth D. Schoen, Brad Warren:
Let's Encrypt: An Automated Certificate Authority to Encrypt the Entire Web. CCS 2019: 2473-2487 - 2018
- [j6]Stephen Checkoway, Jacob Maskiewicz, Christina Garman, Joshua Fried, Shaanan Cohney, Matthew Green, Nadia Heninger, Ralf-Philipp Weinmann, Eric Rescorla, Hovav Shacham:
Where did I leave my keys?: lessons from the Juniper Dual EC incident. Commun. ACM 61(11): 148-155 (2018) - [i29]Jon Peterson, Cullen Jennings, Eric Rescorla, Chris Wendt:
Authenticated Identity Management in the Session Initiation Protocol (SIP). RFC 8224: 1-46 (2018) - [i28]Eric Rescorla:
The Transport Layer Security (TLS) Protocol Version 1.3. RFC 8446: 1-160 (2018) - 2017
- [j5]Eric Rescorla:
Technical Perspective: Cleaning up flaws in TLS implementations. Commun. ACM 60(2): 98 (2017) - 2016
- [c14]Stephen Checkoway, Jacob Maskiewicz, Christina Garman, Joshua Fried, Shaanan Cohney, Matthew Green, Nadia Heninger, Ralf-Philipp Weinmann, Eric Rescorla, Hovav Shacham:
A Systematic Analysis of the Juniper Dual EC Incident. CCS 2016: 468-479 - [i27]Stephen Checkoway, Shaanan Cohney, Christina Garman, Matthew Green, Nadia Heninger, Jacob Maskiewicz, Eric Rescorla, Hovav Shacham, Ralf-Philipp Weinmann:
A Systematic Analysis of the Juniper Dual EC Incident. IACR Cryptol. ePrint Arch. 2016: 376 (2016) - [i26]Cullen Jennings, Bruce Lowekamp, Eric Rescorla, Salman Abdul Baset, Henning Schulzrinne, Thomas C. Schmidt:
A SIP Usage for REsource LOcation And Discovery (RELOAD). RFC 7904: 1-20 (2016) - 2014
- [c13]Keaton Mowery, Eric Wustrow, Tom Wypych, Corey Singleton, Chris Comfort, Eric Rescorla, J. Alex Halderman, Hovav Shacham, Stephen Checkoway:
Security Analysis of a Full-Body Scanner. USENIX Security Symposium 2014: 369-384 - [i25]Cullen Jennings, Bruce Lowekamp, Eric Rescorla, Salman Abdul Baset, Henning Schulzrinne:
REsource LOcation And Discovery (RELOAD) Base Protocol. RFC 6940: 1-176 (2014) - 2013
- [c12]Wilson Lian, Eric Rescorla, Hovav Shacham, Stefan Savage:
Measuring the Practical Impact of DNSSEC Deployment. USENIX Security Symposium 2013: 573-588 - [i24]Richard L. Barnes, Stephen T. Kent, Eric Rescorla:
Further Key Words for Use in RFCs to Indicate Requirement Levels. RFC 6919: 1-6 (2013) - [i23]Ali C. Begen, Colin Perkins, Dan Wing, Eric Rescorla:
Guidelines for Choosing RTP Control Protocol (RTCP) Canonical Names (CNAMEs). RFC 7022: 1-10 (2013) - 2012
- [i22]Eric Rescorla, Nagendra Modadugu:
Datagram Transport Layer Security Version 1.2. RFC 6347: 1-32 (2012) - 2011
- [c11]Eric Rescorla:
Stone Knives and Bear Skins: Why Does the Internet Run on Pre-historic Cryptography? INDOCRYPT 2011: 343 - [i21]Michael Tüxen, Robin Seggelmann, Eric Rescorla:
Datagram Transport Layer Security (DTLS) for Stream Control Transmission Protocol (SCTP). RFC 6083: 1-9 (2011) - 2010
- [j4]Theo Zourzouvillys, Eric Rescorla:
An Introduction to Standards-Based VoIP: SIP, RTP, and Friends. IEEE Internet Comput. 14(2): 69-73 (2010) - [j3]Stephen Checkoway, Hovav Shacham, Eric Rescorla:
Don't Take LaTeX Files from Strangers. login Usenix Mag. 35(4) (2010) - [c10]Stephen Checkoway, Hovav Shacham, Eric Rescorla:
Are Text-Only Data Formats Safe? Or, Use This LaTeX Class File to Pwn Your Computer. LEET 2010 - [c9]Kai Wang, Eric Rescorla, Hovav Shacham, Serge J. Belongie:
OpenScan: A Fully Transparent Optical Scan Voting System. EVT/WOTE 2010 - [e1]Douglas W. Jones, Jean-Jacques Quisquater, Eric Rescorla:
2010 Electronic Voting Technology Workshop / Workshop on Trustworthy Elections, EVT/WOTE '10, Washington, D.C., USA, August 9-10, 2010. USENIX Association 2010 [contents] - [i20]Eric Rescorla:
Keying Material Exporters for Transport Layer Security (TLS). RFC 5705: 1-7 (2010) - [i19]Eric Rescorla, Marsh Ray, Steve Dispensa, Nasko Oskov:
Transport Layer Security (TLS) Renegotiation Indication Extension. RFC 5746: 1-15 (2010) - [i18]Jason Fischl, Hannes Tschofenig, Eric Rescorla:
Framework for Establishing a Secure Real-time Transport Protocol (SRTP) Security Context Using Datagram Transport Layer Security (DTLS). RFC 5763: 1-37 (2010) - [i17]David A. McGrew, Eric Rescorla:
Datagram Transport Layer Security (DTLS) Extension to Establish Keys for the Secure Real-time Transport Protocol (SRTP). RFC 5764: 1-26 (2010) - [i16]Gregory M. Lebovitz, Eric Rescorla:
Cryptographic Algorithms for the TCP Authentication Option (TCP-AO). RFC 5926: 1-15 (2010)
2000 – 2009
- 2009
- [c8]Scott Yilek, Eric Rescorla, Hovav Shacham, Brandon Enright, Stefan Savage:
When private keys are public: results from the 2008 Debian OpenSSL vulnerability. Internet Measurement Conference 2009: 15-27 - [c7]Eric Rescorla:
On the Security of Election Audits with Low Entropy Randomness. EVT/WOTE 2009 - [c6]Eric Rescorla:
Understanding the Security Properties of Ballot-Based Verification Techniques. EVT/WOTE 2009 - [i15]Margaret Salter, Eric Rescorla, Russ Housley:
Suite B Profile for Transport Layer Security (TLS). RFC 5430: 1-12 (2009) - 2008
- [c5]J. Alex Halderman, Eric Rescorla, Hovav Shacham, David A. Wagner:
You Go to Elections with the Voting System You Have: Stop-Gap Mitigations for Deployed Voting Systems. EVT 2008 - [i14]Tim Dierks, Eric Rescorla:
The Transport Layer Security (TLS) Protocol Version 1.2. RFC 5246: 1-104 (2008) - [i13]Eric Rescorla:
TLS Elliptic Curve Cipher Suites with SHA-256/384 and AES Galois Counter Mode (GCM). RFC 5289: 1-6 (2008) - 2007
- [i12]Michael Tüxen, Randall R. Stewart, Peter Lei, Eric Rescorla:
Authenticated Chunks for the Stream Control Transmission Protocol (SCTP). RFC 4895: 1-19 (2007) - 2006
- [c4]Steven M. Bellovin, Eric Rescorla:
Deploying a New Hash Algorithm. NDSS 2006 - [i11]Tim Dierks, Eric Rescorla:
The Transport Layer Security (TLS) Protocol Version 1.1. RFC 4346: 1-87 (2006) - [i10]Eric Rescorla, Nagendra Modadugu:
Datagram Transport Layer Security. RFC 4347: 1-25 (2006) - [i9]Mark James Handley, Eric Rescorla, Internet Architecture Board:
Internet Denial-of-Service Considerations. RFC 4732: 1-38 (2006) - 2005
- [j2]Eric Rescorla:
Is Finding Security Holes a Good Idea? IEEE Secur. Priv. 3(1): 14-19 (2005) - [i8]Eric Rescorla, Internet Architecture Board:
Writing Protocol Models. RFC 4101: 1-22 (2005) - 2004
- [j1]Hovav Shacham, Dan Boneh, Eric Rescorla:
Client-side caching for TLS. ACM Trans. Inf. Syst. Secur. 7(4): 553-575 (2004) - [c3]Nagendra Modadugu, Eric Rescorla:
The Design and Implementation of Datagram TLS. NDSS 2004 - 2003
- [c2]Eric Rescorla:
Security Holes . . . Who Cares? USENIX Security Symposium 2003 - [i7]Eric Rescorla, Brian Korver:
Guidelines for Writing RFC Text on Security Considerations. RFC 3552: 1-44 (2003) - 2002
- [c1]Eric Rescorla, Adam Cain, Brian Korver:
SSLACC: A Clustered SSL Accelerator. USENIX Security Symposium 2002: 229-246 - [i6]Eric Rescorla:
Preventing the Million Message Attack on Cryptographic Message Syntax. RFC 3218: 1-7 (2002) - [i5]Andreas Jungmaier, Eric Rescorla, Michael Tüxen:
Transport Layer Security over Stream Control Transmission Protocol. RFC 3436: 1-9 (2002) - 2000
- [i4]Eric Rescorla:
HTTP Over TLS. RFC 2818: 1-7 (2000)
1990 – 1999
- 1999
- [i3]Eric Rescorla:
Diffie-Hellman Key Agreement Method. RFC 2631: 1-13 (1999) - [i2]Eric Rescorla, Allan M. Schiffman:
Security Extensions For HTML. RFC 2659: 1-4 (1999) - [i1]Eric Rescorla, Allan M. Schiffman:
The Secure HyperText Transfer Protocol. RFC 2660: 1-45 (1999)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-29 01:12 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint