You Really Shouldn't Roll Your Own Crypto: An Empirical Study of Vulnerabilities in Cryptographic Libraries.
Jenny BlessingMichael A. SpecterDaniel J. WeitznerPublished in: CoRR (2021)
Keyphrases
- security protocols
- security mechanisms
- digital signature
- smart card
- security properties
- information security
- advanced encryption standard
- security vulnerabilities
- security issues
- cryptographic algorithms
- web applications
- digital libraries
- key management
- easy to follow
- high speed
- multimedia
- secure communication
- security requirements
- countermeasures
- security patterns
- resource constrained
- hash functions
- operating system
- access control
- encryption scheme
- coverage includes
- s box
- authentication protocol
- public key
- website