|Paul C. Kocher|
June 11, 1973|
|Alma mater||Stanford University|
|Known for||SSL v3.0, differential power analysis, timing attacks, brute force hardware, tamper-resistant hardware design|
|Institutions||Cryptography Research, Inc.|
Among his most significant achievements are the development of timing attacks that can break implementations of RSA, DSA and fixed-exponent Diffie–Hellman that operate in non-constant time, as well as the co-development of power analysis and differential power analysis. He also contributed to the design of Deep Crack, a DES brute-force key search machine. He was one of the architects of the Secure Sockets Layer (SSL) 3.0 protocol, a cryptographic protocol for secure communications on the Internet.
Kocher was elected to the U.S. National Academy of Engineering in 2009 for his contributions to cryptography and Internet security.
- Kocher, Paul C (1996). "Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems". Annual International Cryptology Conference.
- Kocher, Paul C; Jaffe, Joshua; Jun, Benjamin (1999). "Differential Power Analysis". Annual International Cryptology Conference.
- Official website
- Kocher's page on Rambus, Inc.'s site
- Slashdot interview with Kocher
- C-net interview with Kocher at Archive.is (archived 2013-01-19)
- National Academies announcement
- video interview with Kocher
|This article about a cryptographer is a stub. You can help Wikipedia by expanding it.|