coderman <[email protected]> writes:

>i'm curious to know if there are documented instances of HSM protected
>private keys stolen via exploit against HSM firmware.

www.cl.cam.ac.uk/~mkb23/research/Chrysalis.pdf 

Peter.

_______________________________________________
cryptography mailing list
[email protected]
http://lists.randombit.net/mailman/listinfo/cryptography

Reply via email to