Add RSA, DH and DSA in the Wild (#28)

Such collections are valuable educational material as they help
catalog knowledge about real-world mistakes.
This commit is contained in:
Nazar Serhiichuk 2022-10-06 15:01:22 +03:00 committed by GitHub
parent 0f785e6191
commit 7b9be66e85
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
1 changed files with 1 additions and 0 deletions

View File

@ -107,6 +107,7 @@ It will be extended gradually as I find something of "must-have" value. Pull req
* [Twenty Years of Attacks on the RSA Cryptosystem](http://crypto.stanford.edu/~dabo/pubs/papers/RSA-survey.pdf) - Great inquiry into attacking RSA and it's internals, by Dan Boneh.
* [Remote timing attacks are practical](http://crypto.stanford.edu/~dabo/papers/ssl-timing.pdf) - An example in attacking practical crypto implementationby D. Boneh, D. Brumley.
* [The Equivalence Between the DHP and DLP for Elliptic Curves Used in Practical Applications, Revisited](https://eprint.iacr.org/2005/307.pdf) - by K. Bentahar.
* [RSA, DH and DSA in the Wild](https://eprint.iacr.org/2022/048.pdf) - Collection of implementation mistakes which lead to exploits of assymetric cryptography.
#### Public key cryptography: Elliptic-curve crypto