Current Team Former Members Contributors Acknowledgements

People

Current Team

Karthikeyan Bhargavan

Researcher (DR)
INRIA Paris
Instructor, Ecole Polytechnique
Member, MSR-INRIA Joint Centre
Principal Investigator, ERC CRYSP

Antoine Delignat-Lavaud

Researcher
Microsoft Research, Cambridge

Cédric Fournet

Principal Researcher
Microsoft Researcher, Cambridge
Research Team Leader
MSR-INRIA Joint Centre

Markulf Kohlweiss

Researcher
Microsoft Research, Cambridge

Santiago Zanella-Béguelin

Researcher
Microsoft Research, Cambridge

Jean-Karim Zinzindohoué

Ph.D. Student
INRIA Paris

Benjamin Beurdouche

Research Engineer
MSR-INRIA Joint Centre

Nadim Kobeissi

Ph.D. Student
INRIA Paris

Former Members

Alfredo Pironti

Cyber Security Specialist

Pierre-Yves Strub

Researcher
IMDEA Software, Madrid, Spain

Contributors

David Adrian, Zakir Durumeric, Pierrick Gaudry, Matthew Green, J. Alex Halderman, Nadia Heninger, Gaëtan Leurent, Drew Springall, Emmanuel Thomé, Luke Valenta, Benjamin VanderSloot, Eric Wustrow

Acknowledgements

Many thanks to Matthew Green for his comments on our SMACK paper and his invaluable help in exploiting and disclosing the FREAK attack.

Thanks also to Nadia Heninger who performed the actual factorization attacks on various 512-bit RSA keys. She took the Inria CADO-NFS implementation of the number field sieve algorithm and ran it on Amazon EC2.

Ivan Ristic from the Qualys SSL Labs and the Zmap team provided statistics on websites that enable export cipher suites.

Finally, we thank our contacts at Google (in particular, Adam Langley), Oracle, Apple, OpenSSL, CyaSSL, Akamai, and other vendors for their prompt reaction to the attacks on this page.