DOCSLIB.ORG
Explore
Sign Up
Log In
Upload
Search
Home
» Tags
» Dual EC DRBG
Dual EC DRBG
Making Sense of Snowden, Part II: What's Significant in the NSA
NSA's Efforts to Secure Private-Sector Telecommunications Infrastructure
Comments Received on Special Publication 800-90A, B and C
Crypto Won't Save You Either Sound Advice from The
How to (Pre-)Compute a Ladder
Chacha20-Poly1305 の実装性能調査
Cryptgenrandom()
Backdoors in Crypto the Problem with Castles
Practical State Recovery Attacks Against Legacy RNG Implementations
Kleptography – Overview and a New Proof of Concept
Research on Cryptographic Backdoors
Trapping ECC : Invalid Curve Bug Attacks
Cryptgenrandom()
Dual EC and What It Taught Us About Vulnerabilities of the Standardization Ecosystem
RSA BSAFE CNG Cryptographic Primitives Library 1.0 FIPS 140-2
By-Design Backdooring of Encryption System Can We Trust Foreign Encryption Algorithms?
Backdoors Always Backfire
Librelamp Server Stack Documentation
Top View
RWE-2015-Kelsey-Final 2
Syncdog Cryptographic Module FIPS 140 Security Policy V1-2
On the Practical Exploitability of Dual EC in TLS Implementations
Applied Cryptography Knowledge Area (Draft for Comment)
Dual EC: a Standardized Back Door
Openssl FIPS 140-2 Security Policy Version 2.0.10
On the Practical Exploitability of Dual EC in TLS Implementations
CSE 291-E: Applied Cryptography
The Year in Crypto
Kleptography, Dual EC
Key Management and Certificates
NIST Cryptographic Standards and Guidelines Development Process
Microsoft Windows Common Criteria Evaluation Security Target
FIPS Object Module SE Version 2.0.12 by the Openssl Software Foundation
(In)Secure Internet Communications Trust Issues on TLS, PKI, DNSSEC
Dual EC : a Standardized Back Door
It Is a Riddle Wrapped in a Mystery Inside an Enigma; but Perhaps There Is a Key.” —Winston Churchill, 1939 (In Reference to the Soviet Union)
Generation, Verification, and Attacks on Elliptic Curves and Their
Hedging Public-Key Encryption in the Real World
Kleptography, Dual EC
Dual EC a Standardized Back Door
RSA BSAFE Crypto-C Micro Edition 4.0.1 and 4.0.2.5 Level 1 Security
Elliptic Curve Cryptography and Government Backdoors
A Systematic Analysis of the Juniper Dual EC Incident
Microsoft Windows Common Criteria Evaluation Full Disk Encryption
Dual EC in X9.82 and SP 800-90
On the Practical Exploitability of Dual EC in TLS Implementations
Vmware Openssl FIPS Object Module Software Version: 2.0.9
Elliptic Curves in Cryptography