Sign in

Practical State Recovery Attacks against Legacy RNG Implementations.

Shaanan N. CohneyMatthew D. GreenNadia Heninger
Published in: CCS (2018)
Keyphrases
  • real world
  • case study
  • state space
  • countermeasures
  • database
  • social networks
  • software engineering
  • signal processing
  • practical application