Security assignment 6
References
Adrian, D., Bhargavan, K., Durumeric, Z., Gaudry, P., Green, M., Halderman, J.A., Heninger,
N., Springall, D., Thomé, E., Valenta, L. and VanderSloot, B., 2015, October. Imperfect
forward secrecy: How Diffie-Hellman fails in practice. In Proceedings of the 22nd ACM
SIGSAC Conference on Computer and Communications Security (pp. 5-17).ACM.
Bernstein, D.J., Chang, Y.A., Cheng, C.M., Chou, L.P., Heninger, N., Lange, T., and Van
Someren, N., 2013, December. Factoring RSA keys from certified smart cards:
Coppersmith in the wild. In International Conference on the Theory and Application of
Cryptology and Information Security (pp. 341-360).Springer, Berlin, Heidelberg.
Matsumoto, T., Matsumoto, H., Yamada, K. and Hoshino, S., 2002, January. Impact of artificial
gummy fingers on fingerprint systems.In Proceedings of SPIE (Vol. 4677, No. 1, pp.
275-289).
Nemec, M., Sys, M., Svenda, P., Klinec, D. and Matyas, V., 2017, October. The Return of
Coppersmith's Attack: Practical Factorization of Widely Used RSA Moduli. In
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications
Security (pp. 1631-1648).ACM.
Stuart, A. and Levine, M. (2017). Beyond ‘nothing to hide’: When identity is key to privacy
threat under surveillance. European Journal of Social Psychology, 47(6), pp.694-707.