Detecting Weak Keys in Manufacturing Certificates: A Case Study

A Chi, B Enright, D McGrew - Proceedings of the 39th Annual Computer …, 2023 - dl.acm.org
Weak entropy is an industry-wide challenge for network device vendors. We conducted a
large scale analysis of RSA keys in about 226 million device certificates from one vendor …

Being the developers' friend: Our experience developing a high-precision tool for secure coding

DD Yao, S Rahaman, Y Xiao, S Afrose… - IEEE Security & …, 2022 - ieeexplore.ieee.org
We discuss the needs and challenges of deployable security research by sharing our
experience designing CryptoGuard, a high-precision tool for detecting cryptographic …

Building a modern TRNG: an entropy source interface for RISC-V

MJO Saarinen, GR Newell, B Marshall - … of the 4th ACM Workshop on …, 2020 - dl.acm.org
The currently proposed RISC-V True Random Number Generator (TRNG) architecture
breaks with previous ISA TRNG practice by splitting the Entropy Source (ES) component …

The Encryption Debate: An Enduring Struggle

B Preneel - Proceedings of the Fourteenth ACM Conference on …, 2024 - dl.acm.org
The ongoing conflict between governments seeking lawful access to encrypted information
in the pursuit of national security and crime prevention and the protection of individual …

Development of the RISC-V entropy source interface

MJO Saarinen, GR Newell, B Marshall - Journal of cryptographic …, 2022 - Springer
The RISC-V true random number generator (TRNG) architecture breaks with previous ISA
TRNG practice by splitting the entropy source (ES) component away from cryptographic …

The Governance Landscape

O van Daalen - From Encryption to Quantum Computing: The …, 2024 - Springer
This chapter is about the governance relating to the information security cycle, encryption
and quantum computing. It starts out with providing an overview of the rules relating to the …

Why cryptosystems fail revisited

GM Køien - Wireless Personal Communications, 2019 - Springer
Abstract In the paper “Why Cryptosystems Fail”, Ross Anderson ponders the question about
why cryptosystems really fail. Obviously, there may be weak crypto-algorithms, too short key …

Dependencies in Topic Delineation and Tracking

A Struck - 2025 - edoc.hu-berlin.de
Zitationsnetzwerke akademischer Publikationen werden zur Themenerkennung und-
verfolgung mittels bibliometrischer Verfahren erstellt und zerteilt. Ergebnisse können jedoch …

Highly-Effective Backdoors for Hash Functions and Beyond

M Bellare, D Riepel, L Shea - Cryptology ePrint Archive, 2024 - eprint.iacr.org
We study the possibility of schemes whose public parameters have been generated along
with a backdoor. We consider the goal of the big-brother adversary to be two-fold: It desires …

[引用][C] Building a Modern TRNG