<--- Back to Details
First PageDocument Content
Electronic commerce / RSA / Key / Cryptanalysis / Cryptography / Public-key cryptography / Key management
Date: 2014-11-03 05:59:17
Electronic commerce
RSA
Key
Cryptanalysis
Cryptography
Public-key cryptography
Key management

Exploiting Poor Randomness: Lattice-Based Techniques Nadia Heninger University of Pennsylvania October 16, 2014

Add to Reading List

Source URL: attackschool.di.uminho.pt

Download Document from Source Website

File Size: 447,11 KB

Share Document on Facebook

Similar Documents