Paper 2022/048
RSA, DH, and DSA in the Wild
Nadia Heninger
Abstract
This book chapter outlines techniques for breaking cryptography by taking advantage of implementation mistakes made in practice, with a focus on those that exploit the mathematical structure of the most widely used public-key primitives.
Metadata
- Available format(s)
- Category
- Public-key cryptography
- Publication info
- Published elsewhere. Minor revision. Computational Cryptography, edited by Joppe W. Bos and Martijn Stam, Cambridge Press
- DOI
- 10.1017/9781108854207
- Keywords
- RSADiffie-HellmanECDHDSAECDSAdigital signaturesimplementationpublic-key cryptography
- Contact author(s)
- nadiah @ cs ucsd edu
- History
- 2022-01-14: received
- Short URL
- https://ia.cr/2022/048
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2022/048, author = {Nadia Heninger}, title = {{RSA}, {DH}, and {DSA} in the Wild}, howpublished = {Cryptology {ePrint} Archive, Paper 2022/048}, year = {2022}, doi = {10.1017/9781108854207}, url = {https://eprint.iacr.org/2022/048} }