2 {\hyperref{http://stackexchange.com/}{}{}{Proceedings}
3 \hyperref{http://stackexchange.com/}{}{}{of}
4 \hyperref{http://stackexchange.com/}{}{}{Symposia}
5 \hyperref{http://stackexchange.com/}{}{}{in}
6 \hyperref{http://stackexchange.com/}{}{}{Applied}
7 \hyperref{http://stackexchange.com/}{}{}{Mathematics}}
10 {\hyperref{http://polarssl.org/}{}{}{PolarSSL}}
12 @string {I_Stackexchange =
13 {\hyperref{http://stackexchange.com/}{}{}{Stackexchange}
14 \hyperref{http://stackexchange.com/}{}{}{Q\&A}
15 \hyperref{http://stackexchange.com/}{}{}{Site}}
17 @string {I_Wikipedia =
18 {\hyperref{http://wikipedia.org/}{}{}{Wikipedia}}
21 {\hyperref{http://mathworld.wolfram.com/}{}{}{Wolfram}
22 \hyperref{http://mathworld.wolfram.com/}{}{}{Research}
23 \hyperref{http://mathworld.wolfram.com/}{}{}{Mathworld}}
26 {\hyperref{http://tomacs.acm.org/}{}{}{ACM}
27 \hyperref{http://tomacs.acm.org/}{}{}{Transactions}
28 \hyperref{http://tomacs.acm.org/}{}{}{on}
29 \hyperref{http://tomacs.acm.org/}{}{}{Modeling}
30 \hyperref{http://tomacs.acm.org/}{}{}{and}
31 \hyperref{http://tomacs.acm.org/}{}{}{Computer}
32 \hyperref{http://tomacs.acm.org/}{}{}{Simulation}}
35 @inproceedings{HDWH12,
36 author = {Nadia Heninger and Zakir Durumeric and Eric Wustrow
37 and J. Alex Halderman},
38 title = {Mining Your {P}s and {Q}s: {D}etection of Widespread Weak Keys
40 booktitle = {Proceedings of the 21st {USENIX} Security Symposium},
43 url = {https://factorable.net/weakkeys12.extended.pdf},
46 @techreport{Wikipedia:/dev/random,
47 key = {Wikipedia:/dev/random},
48 title = {/dev/random},
49 institution = I_Wikipedia,
53 url = {http://en.wikipedia.org/wiki/dev/random},
54 note = {Accessed 2013-12-06},
58 author = {A. Seznec and N. Sendrier},
59 title = {{HAVEGE}: a user-level software heuristic for generating
60 empirically strong random numbers},
67 url = {http://www.irisa.fr/caps/projects/hipsor/scripts/down.php?id=13781296&ext=.pdf},
71 author = {Jakob Engblom},
72 title = {Evaluating {HAVEGE} Randomness},
75 type = {Blog: Observations from Uppsala},
76 url = {http://jakob.engbloms.se/archives/1374},
81 title = {Weak random number generation within virtualized
83 institution = I_PolarSSL,
86 type = {Security Advisory},
88 url = {https://polarssl.org/tech-updates/security-advisories/polarssl-security-advisory-2011-02},
93 title = {haveged -- A simple entropy daemon},
96 type = {Software Homepage},
97 url = {http://www.issihosts.com/haveged/},
98 note = {Accessed 2013-12-06},
103 title = {haveged -- A simple entropy daemon: Runtime Testing},
106 type = {Technical Background},
107 url = {http://www.issihosts.com/haveged/},
108 note = {Accessed 2013-12-06},
111 @book{katz2008introduction,
112 title={Introduction to modern cryptography},
113 author={Katz, J. and Lindell, Y.},
114 isbn={9781584885511},
116 series={Chapman and Hall/CRC Cryptography and Network Security Series},
117 url={http://books.google.at/books?id=WIc\_AQAAIAAJ},
119 publisher={Chapman \& Hall/CRC}
124 title = {SafeCurves: choosing safe curves for elliptic-curve cryptography},
127 type = {Technical Background},
128 url = {http://safecurves.cr.yp.to/rigid.html},
129 note = {Accessed 2013-12-09},
132 @techreport{Wikipedia:ExportCipher,
133 key = {Wikipedia:ExportCipher},
134 title = {Export of cryptography in the {U}nited {S}tates},
135 institution = I_Wikipedia,
139 url = {http://en.wikipedia.org/wiki/Export_of_cryptography_in_the_United_States},
140 note = {Accessed 2013-12-09},
143 @techreport{Wikipedia:Tempest,
144 key = {Wikipedia:Tempest},
145 title = {Tempest (codename)},
146 institution = I_Wikipedia,
150 url = {https://en.wikipedia.org/wiki/Tempest_(codename)},
151 note = {Accessed 2013-12-12},
154 @techreport{Wikipedia:Discrete,
155 key = {Wikipedia:Discrete},
156 title = {Discrete logarithm},
157 institution = I_Wikipedia,
161 url = {https://en.wikipedia.org/wiki/Discrete_logarithm},
162 note = {Accessed 2013-12-12},
165 @techreport{Wikipedia:Certificate,
166 key = {Wikipedia:Certificate},
167 title = {Certificate Policy},
168 institution = I_Wikipedia,
172 url = {https://en.wikipedia.org/wiki/Certificate_Policy},
173 note = {Accessed 2013-12-12},
177 author = {Bruce Schneier},
178 title = {The {NSA} Is Breaking Most Encryption on the Internet},
181 type = {Blog: Schneier on Security},
182 url = {https://www.schneier.com/blog/archives/2013/09/the_nsa_is_brea.html},
186 author = {Bruce Schneier},
187 title = {The {NSA} Is Breaking Most Encryption on the Internet},
190 type = {Answer to Blog Comment},
191 url = {https://www.schneier.com/blog/archives/2013/09/the_nsa_is_brea.html\#c1675929},
195 author = {D. J. Bernstein and Tanja Lange},
196 title = {Security dangers of the {NIST} curves},
199 type = {Presentation slides},
200 url = {http://cr.yp.to/talks/2013.09.16/slides-djb-20130916-a4.pdf},
205 title = {Should we trust the {NIST}-recommended {ECC} parameters?},
208 type = {Stackexchange Question},
209 institution = I_Stackexchange,
210 url = {http://crypto.stackexchange.com/questions/10263/should-we-trust-the-nist-recommended-ecc-parameters},
213 @inproceedings{McC90,
214 author = {Kevin S. McCurley},
215 title = {The Discrete Logarithm Problem},
216 booktitle = {Cryptology and Computational Number Theory, } # J_AM,
220 url = {http://www.mccurley.org/papers/dlog.pdf},
224 key = {Wolfram Research, Mathworld},
225 title = {Elliptic Curve},
228 type = {Math Dictionary Entry},
229 institution = I_Wolfram,
230 url = {http://mathworld.wolfram.com/EllipticCurve.html},
231 note = {Accessed 2013-12-12},