Reference
13. L. Valentaet al., Factoring as a Service, in Financial Cryptography and Data Security,Barbados, 2016
14. S. Yileket al., When private keys are public: results from the 2008 DebianOpenSSLvulnerability, in ACM IMC, 2009
15. Debian OpenSSL Predictable PRNG, https://github.com/g0tmi1k/debian-ssh
16. N. Heninger et al., Mining Your Ps and Qs: Detection of Widespread Weak Keys in Network Devices, in USENIX, 2012
17. A. Everspaugh et al., Not-So-Random Numbers in Virtualized Linux and the Whirlwind RNG View Document, IEEE S&P,
2014
18. L. Valentaet al., Factoring as a Service, in Financial Cryptography and Data Security, 2016
19. D. Boneh, Twenty Years of Attacks on the RSA Cryptosystem, Notices of the AMS, 1999
20. Dual EC DRBG 後門事件的歷史發展摘要及雜記, http://ckhung0.blogspot.tw/2014/03/dual-ec-drbg.html
21. J. B. Bos, Selecting Elliptic Curves for Cryptography: An Efficiency and Security Analysis, Selecting Elliptic Curves for
Cryptography