First Page | Document Content | |
---|---|---|
Date: 2014-11-03 05:59:17Electronic commerce RSA Key Cryptanalysis Cryptography Public-key cryptography Key management | Exploiting Poor Randomness: Lattice-Based Techniques Nadia Heninger University of Pennsylvania October 16, 2014Add to Reading ListSource URL: attackschool.di.uminho.ptDownload Document from Source WebsiteFile Size: 447,11 KBShare Document on Facebook |