Back to Results
First PageMeta Content
Cryptography / Pseudorandom number generators / Cryptographic protocols / Internet protocols / National Institute of Standards and Technology / Nadia Heninger / Dual EC DRBG / DiffieHellman key exchange / IPsec / Transport Layer Security / Internet Key Exchange / OpenSSL


1 Practical state recovery attacks against legacy RNG implementations ∗ University
Add to Reading List

Document Date: 2017-11-01 13:12:37


Open Document

File Size: 486,25 KB

Share Result on Facebook