Differences
This shows you the differences between two versions of the page.
Both sides previous revision Previous revision | Last revisionBoth sides next revision | ||
public:blog:usenix_security_2016_-_best_paper_award [2016-12-29 14:04] – xsvenda | public:blog:usenix_security_2016_-_best_paper_award [2016-12-29 14:08] – xsvenda | ||
---|---|---|---|
Line 1: | Line 1: | ||
====== USENIX Security 2016 - Best Paper Award ====== | ====== USENIX Security 2016 - Best Paper Award ====== | ||
+ | //Written by Petr Svenda, 2016-09-01.// | ||
What started as an attempt to investigate how cryptographic smart cards are generating RSA key pairs ended as surprising resulting showing that library or device responsible for generating given key can be identified - based on public key only. Simply put, if you have RSA public key, we can say which library generated it. And we got [[https:// | What started as an attempt to investigate how cryptographic smart cards are generating RSA key pairs ended as surprising resulting showing that library or device responsible for generating given key can be identified - based on public key only. Simply put, if you have RSA public key, we can say which library generated it. And we got [[https:// |