|Paul C. Kocher|
June 11, 1973 |
|Institutions||Cryptography Research, Inc.|
|Alma mater||Stanford University|
|Known for||SSL v3.0, differential power analysis, timing attacks, brute force hardware, tamper-resistant hardware design|
Among his most significant achievements are the development of timing attacks that can break implementations of RSA, DSA and fixed-exponent Diffie–Hellman that operate in non-constant time, as well as the co-development of power analysis and differential power analysis. He also contributed to the design of Deep Crack, a DES brute-force key search machine. He was one of the architects of the Secure Sockets Layer (SSL) 3.0 protocol, a cryptographic protocol for secure communications on the Internet.
Kocher was elected to the U.S. National Academy of Engineering in 2009 for his contributions to cryptography and Internet security.
Kocher was made an ICAR Fellow at Crypto 2014.
- Kocher's page on Cryptography Research, Inc.'s site
- Slashdot interview with Kocher
- C-net interview with Kocher
- National Academies announcement
- video interview with Kocher
|This article about a cryptographer is a stub. You can help Wikipedia by expanding it.|