On 11/03/2015 05:25 am, Peter Gutmann wrote:
ianG writes:
"We will also describe and present results for an entirely new unpublished
attack against a Chinese Remainder Theorem (CRT) implementation of RSA that
will yield private key information in a single trace."
An actual cryptography breach
On a related topic, I love the fact that they not only have a Trusted
Computing Jamboree, a celebration of subverting TCG technology, but that this
is the seventh annual one...
Peter.
___
cryptography mailing list
cryptography@randombit.net
http://lists.
ianG writes:
>"We will also describe and present results for an entirely new unpublished
>attack against a Chinese Remainder Theorem (CRT) implementation of RSA that
>will yield private key information in a single trace."
>
>An actual cryptography breach! Outstanding if true...
No, just a DPA a
On 10/03/2015 11:38 am, John Young wrote:
The Intercept has released files on Apple, DPA and other
cryptanalysis:
http://cryptome.org/2015/03/nsa-apple-dpa-intercept-15-0309.zip (12pp,
1.9MB)
tpm-vulnerabilities... 16th March 2012?
"We will also describe and present results for an entirely ne
On 3/10/2015 7:38 AM, John Young wrote:
The Intercept has released files on Apple, DPA and other
cryptanalysis:
http://cryptome.org/2015/03/nsa-apple-dpa-intercept-15-0309.zip (12pp,
1.9MB)
___
cryptography mailing list
cryptography@randombit.net
h
The Intercept has released files on Apple, DPA and other
cryptanalysis:
http://cryptome.org/2015/03/nsa-apple-dpa-intercept-15-0309.zip (12pp, 1.9MB)
___
cryptography mailing list
cryptography@randombit.net
http://lists.randombit.net/mailman/listinfo/