Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Next revision
Previous revision
public:blog:usenix_security_2016_-_best_paper_award [2016-12-29 13:53] – created xsvendapublic:blog:usenix_security_2016_-_best_paper_award [2016-12-29 14:33] (current) xsvenda
Line 1: Line 1:
 ====== USENIX Security 2016 - Best Paper Award ====== ====== USENIX Security 2016 - Best Paper Award ======
 +//Written by Petr Svenda, 2016-09-01.//
  
-What started as an attempt to investigate how cryptographic smart cards are generating RSA key pairs ended as surprising resulting showing that library or device responsible for generating given key can be identified - based on public key only. Simply put, if you have RSA public key, we can say which library generated it. And we got [[https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/svenda | Best Paper Award]] out of it at [[https://www.usenix.org/conference/usenixsecurity16 | 25th USENIX Security Symposium]], 2016. The paper name is **//The Million-Key Question—Investigating the Origins of RSA Public Keys//**. +<callout type="info">What started as an attempt to investigate how cryptographic smart cards are generating RSA key pairs ended as surprising resulting showing that library or device responsible for generating given key can be identified - based on public key only. Simply put, if you have RSA public key, we can say which library generated it. And we got [[https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/svenda | Best Paper Award]] out of it at [[https://www.usenix.org/conference/usenixsecurity16 | 25th USENIX Security Symposium]], 2016. The paper name is **//The Million-Key Question—Investigating the Origins of RSA Public Keys//**. </callout> 
 + 
 +===== =====
  
 The paper's abstract captures the main points: The paper's abstract captures the main points: