Slide 95
Slide 95 text
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
92/92
RSA
RSA Digital Signature
Signature Forgery
M. Kamel Ariffin, S. Abubakar, F. Yunos, and M. Asbullah,
“New cryptanalytic attack on rsa modulus n= pq using small
prime difference method,” Cryptography, vol. 3, no. 1, p. 2,
2019.
N. Heninger, Z. Durumeric, E. Wustrow, and J. A. Halderman,
“Mining your ps and qs: Detection of widespread weak keys in
network devices,” in Presented as part of the 21st {USENIX}
Security Symposium ({USENIX} Security 12), pp. 205–220,
2012.
N. Aviram, S. Schinzel, J. Somorovsky, N. Heninger,
M. Dankel, J. Steube, L. Valenta, D. Adrian, J. A. Halderman,
V. Dukhovni, et al., “{DROWN}: Breaking {TLS} using
sslv2,” in 25th {USENIX} Security Symposium ({USENIX}
Security 16), pp. 689–706, 2016.
H. Böck, J. Somorovsky, and C. Young, “Return of
bleichenbacher’s oracle threat ({ROBOT}),” in 27th