where the ? is the first letter of the most common first request header. A bit less reliable for a given target (due to needing to guess the header), but a bit more effective in general (due to not actually caring about the domain).
Yes, a single block encrypted under 2^40 distinct keys (you can generalize this to a few popular blocks, instead of just the same block encrypted over and over). Each key you guess during bruteforce has a 2^40/2^128 chance of being correct. After 2^88 AES operations you're likely to recover at least one key. After 2^100 you've recovered, on average, 4096 out of the 2^40 keys.
"Real-world clients often support non-elliptic "DHE" along with, or instead of, elliptic "ECDHE". It would be interesting to trace the reasons for this: for example, were people worried about ECC patents?"
DHE was in the original SSLv3 spec, but not commonly used before NSS added support for DHE_RSA in the early 2000s I think. ECDHE did not come until much later.
What are the incentives for the authors of the linked papers? Why would they round up an old, incorrect, estimate of RSA factoring? Is this just engineers engaging in "optimization" and trying to edge out more performance?