Quantum random number generators

M Herrero-Collantes, JC Garcia-Escartin - Reviews of Modern Physics, 2017 - APS
Random numbers are a fundamental resource in science and engineering with important
applications in simulation and cryptography. The inherent randomness at the core of …

Elliptic curve cryptography in practice

JW Bos, JA Halderman, N Heninger, J Moore… - … Cryptography and Data …, 2014 - Springer
In this paper we perform a review of elliptic curve cryptography (ECC) as it is used in
practice today in order to reveal unique mistakes and vulnerabilities that arise in …

The return of coppersmith's attack: Practical factorization of widely used RSA moduli

M Nemec, M Sys, P Svenda, D Klinec… - Proceedings of the 2017 …, 2017 - dl.acm.org
We report on our discovery of an algorithmic flaw in the construction of primes for RSA key
generation in a widely-used library of a major manufacturer of cryptographic hardware. The …

Cache attacks enable bulk key recovery on the cloud

MS Inci, B Gulmezoglu, G Irazoqui, T Eisenbarth… - … and Embedded Systems …, 2016 - Springer
Cloud services keep gaining popularity despite the security concerns. While non-sensitive
data is easily trusted to cloud, security critical data and applications are not. The main …

Cryptoguard: High precision detection of cryptographic vulnerabilities in massive-sized java projects

S Rahaman, Y **ao, S Afrose, F Shaon, K Tian… - Proceedings of the …, 2019 - dl.acm.org
Cryptographic API misuses, such as exposed secrets, predictable random numbers, and
vulnerable certificate verification, seriously threaten software security. The vision of …

Fast practical lattice reduction through iterated compression

K Ryan, N Heninger - Annual International Cryptology Conference, 2023 - Springer
We introduce a new lattice basis reduction algorithm with approximation guarantees
analogous to the LLL algorithm and practical performance that far exceeds the current state …

A systematic analysis of the Juniper Dual EC incident

S Checkoway, J Maskiewicz, C Garman… - Proceedings of the …, 2016 - dl.acm.org
In December 2015, Juniper Networks announced multiple security vulnerabilities stemming
from unauthorized code in ScreenOS, the operating system for their NetScreen VPN routers …

ES-TRNG: A high-throughput, low-area true random number generator based on edge sampling

B Yang, V Rožic, M Grujic, N Mentens… - IACR Transactions on …, 2018 - tches.iacr.org
In this paper we present a novel true random number generator based on high-precision
edge sampling. We use two novel techniques to increase the throughput and reduce the …

Cache-timing attacks on RSA key generation

AC Aldaya, CP García, LMA Tapia… - Cryptology ePrint …, 2018 - eprint.iacr.org
During the last decade, constant-time cryptographic software has quickly transitioned from
an academic construct to a concrete security requirement for real-world libraries. Most of …

A formal treatment of backdoored pseudorandom generators

Y Dodis, C Ganesh, A Golovnev, A Juels… - Advances in Cryptology …, 2015 - Springer
We provide a formal treatment of backdoored pseudorandom generators (PRGs). Here a
saboteur chooses a PRG instance for which she knows a trapdoor that allows prediction of …