Kevin P. Dyer
Kevin P. Dyer
Verified email at - Homepage
Cited by
Cited by
Peek-a-Boo, I Still See You: Why Efficient Traffic Analysis Countermeasures Fail
KP Dyer, SE Coull, T Ristenpart, T Shrimpton
IEEE Symposium on Security and Privacy 2012, 2012
Protocol misidentification made easy with format-transforming encryption
KP Dyer, SE Coull, T Ristenpart, T Shrimpton
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
Traffic analysis of encrypted messaging services: Apple imessage and beyond
SE Coull, KP Dyer
ACM SIGCOMM Computer Communication Review 44 (5), 5-11, 2014
Seeing through network-protocol obfuscation
L Wang, KP Dyer, A Akella, T Ristenpart, T Shrimpton
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
Marionette: A programmable network traffic obfuscation system
KP Dyer, SE Coull, T Shrimpton
24th {USENIX} Security Symposium ({USENIX} Security 15), 367-382, 2015
LibFTE: A Toolkit for Constructing Practical, Format-Abiding Encryption Schemes
D Luchaup, KP Dyer, S Jha, T Ristenpart, T Shrimpton
USENIX Security 2014, 2014
Novel Cryptographic Primitives and Protocols for Censorship Resistance
KP Dyer
Portland State University, 2015
Cryptanalysis of the SHA Family of Hash Functions
KP Dyer
Royal Holloway, University of London, 2007
Linear cryptanalysis of two round 16 step MD5 over the rationals
KP Dyer, EF Schaefer
Southern Africa Mathematical Sciences Association, 2005, 2005
The system can't perform the operation now. Try again later.
Articles 1–9