Procedure for the Detection of Anomalies in Public Key Infrastructure (RSA Systems)

Cryptographic techniques authenticate users and protect information confidentiality. These tasks are performed by subsystems called Oracles. The most popular is the RSA system based on two large primes granting secure services. In 2008, a programming error in Open-SSL of the Debian system was detect...

Descripción completa

Guardado en:
Detalles Bibliográficos
Autores principales: Castro Lechtaler, Antonio, Cipriano, Marcelo, Malvacio, Eduardo, Cañón, Sebastián
Formato: Objeto de conferencia
Lenguaje:Inglés
Publicado: 2012
Materias:
SSL
RSA
Acceso en línea:http://sedici.unlp.edu.ar/handle/10915/123949
https://41jaiio.sadio.org.ar/sites/default/files/25_AST_2012.pdf
Aporte de:

Ejemplares similares