- Full text PDF available (4)
The SSL man-in-the-middle attack uses forged SSL certificates to intercept encrypted connections between clients and servers. However, due to a lack of reliable indicators, it is still unclear how commonplace these attacks occur in the wild. In this work, we have designed and implemented a method to detect the occurrence of SSL man-in-the-middle attack on a… (More)
We give the complete list of possible torsion subgroups of elliptic curves with complex multiplication over number fields of degree 1-13. Additionally we describe the algorithm used to compute these torsion subgroups and its implementation.
Acknowledgements Foremost, I am profoundly indepted to Collin Jackson, who introduced me to browser security research and provided incredible guidance and support during my time at Carnegie Mellon University. I owe a great debt of gratitude to my thesis committee, collaborated with me on the research described in this thesis. I would like to thank my… (More)
In this short note, we closely follow the approach of Green and Tao to extend the best known bound for recurrence modulo 1 from squares to the largest possible class of polynomials. The paper concludes with a brief discussion of a consequence of this result for polynomial structures in sumsets and limitations of the method.