Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revision Previous revision
public:blog:usenix_security_2016_-_best_paper_award [2016-12-29 14:08] xsvendapublic:blog:usenix_security_2016_-_best_paper_award [2016-12-29 14:33] (current) xsvenda
Line 2: Line 2:
 //Written by Petr Svenda, 2016-09-01.// //Written by Petr Svenda, 2016-09-01.//
  
-What started as an attempt to investigate how cryptographic smart cards are generating RSA key pairs ended as surprising resulting showing that library or device responsible for generating given key can be identified - based on public key only. Simply put, if you have RSA public key, we can say which library generated it. And we got [[https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/svenda | Best Paper Award]] out of it at [[https://www.usenix.org/conference/usenixsecurity16 | 25th USENIX Security Symposium]], 2016. The paper name is **//The Million-Key Question—Investigating the Origins of RSA Public Keys//**. +<callout type="info">What started as an attempt to investigate how cryptographic smart cards are generating RSA key pairs ended as surprising resulting showing that library or device responsible for generating given key can be identified - based on public key only. Simply put, if you have RSA public key, we can say which library generated it. And we got [[https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/svenda | Best Paper Award]] out of it at [[https://www.usenix.org/conference/usenixsecurity16 | 25th USENIX Security Symposium]], 2016. The paper name is **//The Million-Key Question—Investigating the Origins of RSA Public Keys//**. </callout>
  
 ===== ===== ===== =====