coderman <[email protected]> writes: >i'm curious to know if there are documented instances of HSM protected >private keys stolen via exploit against HSM firmware.
www.cl.cam.ac.uk/~mkb23/research/Chrysalis.pdf Peter. _______________________________________________ cryptography mailing list [email protected] http://lists.randombit.net/mailman/listinfo/cryptography
