Security assessment and evaluation of VPNs: a comprehensive survey

H Abbas, N Emmanuel, MF Amjad, T Yaqoob… - ACM Computing …, 2023 - dl.acm.org
The use of Virtual Private Networks (VPNs) has witnessed an outstanding rise as they aim to
provide confidentiality and anonymity to communication. Despite this enormous and …

Quantum generators of random numbers

MM Jacak, P Jóźwiak, J Niemczuk, JE Jacak - Scientific Reports, 2021 - nature.com
Generation of random numbers is a central problem for many applications in the field of
information processing, including, eg, cryptography, in classical and quantum regime, but …

Pseudorandom black swans: Cache attacks on CTR_DRBG

S Cohney, A Kwong, S Paz, D Genkin… - … IEEE Symposium on …, 2020 - ieeexplore.ieee.org
Modern cryptography requires the ability to securely generate pseudorandom numbers.
However, despite decades of work on side-channel attacks, there is little discussion of their …

sec-certs: Examining the security certification practice for better vulnerability mitigation

A Janovsky, J Jancar, P Svenda, Ł Chmielewski… - Computers & …, 2024 - Elsevier
Products certified under security certification frameworks such as Common Criteria undergo
significant scrutiny during the costly certification process. Yet, critical vulnerabilities …

Randomness concerns when deploying differential privacy

SL Garfinkel, P Leclerc - Proceedings of the 19th Workshop on Privacy in …, 2020 - dl.acm.org
The US Census Bureau is using differential privacy (DP) to protect confidential respondent
data collected for the 2020 Decennial Census of Population & Housing. The Census …

On the unbearable lightness of FIPS 140–2 randomness tests

D Hurley-Smith, C Patsakis… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Random number generation is critical to many applications. Gaming, gambling, and
particularly cryptography all require random numbers that are uniform and unpredictable …

Client-side vulnerabilities in commercial vpns

T Bui, S Rao, M Antikainen, T Aura - Secure IT Systems: 24th Nordic …, 2019 - Springer
Internet users increasingly rely on commercial virtual private network (VPN) services to
protect their security and privacy. The VPN services route the client's traffic over an …

RSA, DH, and DSA in the Wild

N Heninger - Cryptology ePrint Archive, 2022 - eprint.iacr.org
RSA, DH and DSA in the Wild Page 1 RSA, DH and DSA in the Wild∗ Nadia Heninger University
of California, San Diego, USA 1 Introduction The previous chapters discussed breaking …

On the possibility of a backdoor in the Micali-Schnorr generator

H Davis, MD Green, N Heninger, K Ryan… - … Conference on Public …, 2024 - Springer
In this paper, we study both the implications and potential impact of backdoored parameters
for two RSA-based pseudorandom number generators: the ISO-standardized Micali-Schnorr …

ZMap performance in open DNS resolver discovery

L Chang, K Lu, C Li, Z Zhang - 2022 2nd Asia-Pacific …, 2022 - ieeexplore.ieee.org
ZMap is a famous host discovery tool. Since open DNS resolvers (ODNSes) are a specific
concern host, ZMap is also widely used to discover ODNSes. This study investigates …