Quantum random number generators
M Herrero-Collantes, JC Garcia-Escartin - Reviews of Modern Physics, 2017 - APS
Random numbers are a fundamental resource in science and engineering with important
applications in simulation and cryptography. The inherent randomness at the core of …
applications in simulation and cryptography. The inherent randomness at the core of …
Elliptic curve cryptography in practice
In this paper we perform a review of elliptic curve cryptography (ECC) as it is used in
practice today in order to reveal unique mistakes and vulnerabilities that arise in …
practice today in order to reveal unique mistakes and vulnerabilities that arise in …
The return of coppersmith's attack: Practical factorization of widely used RSA moduli
We report on our discovery of an algorithmic flaw in the construction of primes for RSA key
generation in a widely-used library of a major manufacturer of cryptographic hardware. The …
generation in a widely-used library of a major manufacturer of cryptographic hardware. The …
Cache attacks enable bulk key recovery on the cloud
Cloud services keep gaining popularity despite the security concerns. While non-sensitive
data is easily trusted to cloud, security critical data and applications are not. The main …
data is easily trusted to cloud, security critical data and applications are not. The main …
Cryptoguard: High precision detection of cryptographic vulnerabilities in massive-sized java projects
Cryptographic API misuses, such as exposed secrets, predictable random numbers, and
vulnerable certificate verification, seriously threaten software security. The vision of …
vulnerable certificate verification, seriously threaten software security. The vision of …
Fast practical lattice reduction through iterated compression
K Ryan, N Heninger - Annual International Cryptology Conference, 2023 - Springer
We introduce a new lattice basis reduction algorithm with approximation guarantees
analogous to the LLL algorithm and practical performance that far exceeds the current state …
analogous to the LLL algorithm and practical performance that far exceeds the current state …
A systematic analysis of the Juniper Dual EC incident
In December 2015, Juniper Networks announced multiple security vulnerabilities stemming
from unauthorized code in ScreenOS, the operating system for their NetScreen VPN routers …
from unauthorized code in ScreenOS, the operating system for their NetScreen VPN routers …
ES-TRNG: A high-throughput, low-area true random number generator based on edge sampling
In this paper we present a novel true random number generator based on high-precision
edge sampling. We use two novel techniques to increase the throughput and reduce the …
edge sampling. We use two novel techniques to increase the throughput and reduce the …
Cache-timing attacks on RSA key generation
During the last decade, constant-time cryptographic software has quickly transitioned from
an academic construct to a concrete security requirement for real-world libraries. Most of …
an academic construct to a concrete security requirement for real-world libraries. Most of …
A formal treatment of backdoored pseudorandom generators
We provide a formal treatment of backdoored pseudorandom generators (PRGs). Here a
saboteur chooses a PRG instance for which she knows a trapdoor that allows prediction of …
saboteur chooses a PRG instance for which she knows a trapdoor that allows prediction of …