|Paul C. Kocher|
June 11, 1973 |
|Institutions||Cryptography Research, Inc.|
|Alma mater||Stanford University|
|Known for||SSL v3.0, differential power analysis, timing attacks, brute force hardware, tamper-resistant hardware design|
Among his most significant achievements are the development of timing attacks that can break implementations of RSA, DSA and fixed-exponent Diffie–Hellman that operate in non-constant time, as well as the co-development of power analysis and differential power analysis. He also contributed to the design of Deep Crack, a DES brute-force key search machine. He was one of the architects of the Secure Sockets Layer (SSL) 3.0 protocol, a cryptographic protocol for secure communications on the Internet.
Kocher was elected to the U.S. National Academy of Engineering in 2009 for his contributions to cryptography and Internet security.
- Kocher's page on Cryptography Research, Inc.'s site
- Slashdot interview with Kocher
- C-net interview with Kocher
- National Academies announcement
- video interview with Kocher
|This article about a cryptographer is a stub. You can help Wikipedia by expanding it.|