SLIDE 21 Random and Key Generation Evaluation of Tokens and Smart Cards Boorghany et al. ISCISC 2014
Our Experiments Background
[GM84] S. Goldwasser, S. Micali, “Probabilistic encryption,” J. Computer and System Sciences, vol. 28, no. 2, pp. 270-299, 1984. [YRS+09] S. Yilek, E. Rescorla, H. Shacham, B. Enright, and S. Savage, “When private keys are public: results from the 2008 Debian OpenSSL vulnerability," In Proc. 9th ACM SIGCOMM Conf., 2009, pp. 15-27. [HDWH12] N. Heninger, Z. Durumeric., E. Wustrow, and J. A. Halderman, “Mining your Ps and Qs: Detection of widespread weak keys in network devices,” In Proc. 21st USENIX Security Symp., 2012, pp. 205-220. [MMS13] K. Michaelis, C. Meyer, and J. Schwenk, “Randomly failed! The state
- f randomness in current Java implementations.” In Proc. Topics in
Cryptology–CT-RSA, 2013, pp. 129-144.
References
21 / 20