2 {\hyperref{http://stackexchange.com/}{}{}{Proceedings}
3 \hyperref{http://stackexchange.com/}{}{}{of}
4 \hyperref{http://stackexchange.com/}{}{}{Symposia}
5 \hyperref{http://stackexchange.com/}{}{}{in}
6 \hyperref{http://stackexchange.com/}{}{}{Applied}
7 \hyperref{http://stackexchange.com/}{}{}{Mathematics}}
10 {\hyperref{http://polarssl.org/}{}{}{PolarSSL}}
12 @string {I_Stackexchange =
13 {\hyperref{http://stackexchange.com/}{}{}{Stackexchange}
14 \hyperref{http://stackexchange.com/}{}{}{Q\&A}
15 \hyperref{http://stackexchange.com/}{}{}{Site}}
17 @string {I_Wikipedia =
18 {\hyperref{http://wikipedia.org/}{}{}{Wikipedia}}
21 {\hyperref{http://mathworld.wolfram.com/}{}{}{Wolfram}
22 \hyperref{http://mathworld.wolfram.com/}{}{}{Research}
23 \hyperref{http://mathworld.wolfram.com/}{}{}{Mathworld}}
26 {\hyperref{http://tomacs.acm.org/}{}{}{ACM}
27 \hyperref{http://tomacs.acm.org/}{}{}{Transactions}
28 \hyperref{http://tomacs.acm.org/}{}{}{on}
29 \hyperref{http://tomacs.acm.org/}{}{}{Modeling}
30 \hyperref{http://tomacs.acm.org/}{}{}{and}
31 \hyperref{http://tomacs.acm.org/}{}{}{Computer}
32 \hyperref{http://tomacs.acm.org/}{}{}{Simulation}}
35 @inproceedings{HDWH12,
36 author = {Nadia Heninger and Zakir Durumeric and Eric Wustrow
37 and J. Alex Halderman},
38 title = {Mining Your {P}s and {Q}s: {D}etection of Widespread Weak Keys
40 booktitle = {Proceedings of the 21st {USENIX} Security Symposium},
43 url = {https://factorable.net/weakkeys12.extended.pdf},
46 @techreport{Wikipedia:/dev/random,
47 key = {Wikipedia:/dev/random},
48 title = {/dev/random},
49 institution = I_Wikipedia,
53 url = {http://en.wikipedia.org/wiki/dev/random},
54 note = {Accessed 2013-12-06},
58 author = {A. Seznec and N. Sendrier},
59 title = {{HAVEGE}: a user-level software heuristic for generating
60 empirically strong random numbers},
67 url = {http://www.irisa.fr/caps/projects/hipsor/scripts/down.php?id=13781296&ext=.pdf},
71 author = {Jakob Engblom},
72 title = {Evaluating {HAVEGE} Randomness},
75 type = {Blog: Observations from Uppsala},
76 url = {http://jakob.engbloms.se/archives/1374},
81 title = {Weak random number generation within virtualized
83 institution = I_PolarSSL,
86 type = {Security Advisory},
88 url = {https://polarssl.org/tech-updates/security-advisories/polarssl-security-advisory-2011-02},
93 title = {haveged -- A simple entropy daemon},
96 type = {Software Homepage},
97 url = {http://www.issihosts.com/haveged/},
98 note = {Accessed 2013-12-06},
103 title = {haveged -- A simple entropy daemon: Runtime Testing},
106 type = {Technical Background},
107 url = {http://www.issihosts.com/haveged/},
108 note = {Accessed 2013-12-06},
111 @book{katz2008introduction,
112 title={Introduction to modern cryptography},
113 author={Katz, J. and Lindell, Y.},
114 isbn={9781584885511},
116 series={Chapman and Hall/CRC Cryptography and Network Security Series},
117 url={http://books.google.at/books?id=WIc\_AQAAIAAJ},
119 publisher={Chapman \& Hall/CRC}
124 title = {SafeCurves: choosing safe curves for elliptic-curve cryptography},
127 type = {Technical Background},
128 url = {http://safecurves.cr.yp.to/rigid.html},
129 note = {Accessed 2013-12-09},
132 @techreport{Wikipedia:ExportCipher,
133 key = {Wikipedia:ExportCipher},
134 title = {Export of cryptography in the {U}nited {S}tates},
135 institution = I_Wikipedia,
139 url = {http://en.wikipedia.org/wiki/Export_of_cryptography_in_the_United_States},
140 note = {Accessed 2013-12-09},
143 @article{ii2011ecrypt,
145 author = {II, ECRYPT and SYM, D},
147 url = {http://www.ecrypt.eu.org/documents/D.SPA.20.pdf},
151 @techreport{Wikipedia:Tempest,
152 key = {Wikipedia:Tempest},
153 title = {Tempest (codename)},
154 institution = I_Wikipedia,
158 url = {https://en.wikipedia.org/wiki/Tempest_(codename)},
159 note = {Accessed 2013-12-12},
162 @techreport{Wikipedia:Discrete,
163 key = {Wikipedia:Discrete},
164 title = {Discrete logarithm},
165 institution = I_Wikipedia,
169 url = {https://en.wikipedia.org/wiki/Discrete_logarithm},
170 note = {Accessed 2013-12-12},
173 @techreport{Wikipedia:Certificate,
174 key = {Wikipedia:Certificate},
175 title = {Certificate Policy},
176 institution = I_Wikipedia,
180 url = {https://en.wikipedia.org/wiki/Certificate_Policy},
181 note = {Accessed 2013-12-12},
185 author = {Bruce Schneier},
186 title = {The {NSA} Is Breaking Most Encryption on the Internet},
189 type = {Blog: Schneier on Security},
190 url = {https://www.schneier.com/blog/archives/2013/09/the_nsa_is_brea.html},
194 author = {Bruce Schneier},
195 title = {The {NSA} Is Breaking Most Encryption on the Internet},
198 type = {Answer to Blog Comment},
199 url = {https://www.schneier.com/blog/archives/2013/09/the_nsa_is_brea.html\#c1675929},
203 author = {D. J. Bernstein and Tanja Lange},
204 title = {Security dangers of the {NIST} curves},
207 type = {Presentation slides},
208 url = {http://cr.yp.to/talks/2013.09.16/slides-djb-20130916-a4.pdf},
213 title = {Should we trust the {NIST}-recommended {ECC} parameters?},
216 type = {Stackexchange Question},
217 institution = I_Stackexchange,
218 url = {http://crypto.stackexchange.com/questions/10263/should-we-trust-the-nist-recommended-ecc-parameters},
221 @inproceedings{McC90,
222 author = {Kevin S. McCurley},
223 title = {The Discrete Logarithm Problem},
224 booktitle = {Cryptology and Computational Number Theory, } # J_AM,
228 url = {http://www.mccurley.org/papers/dlog.pdf},
232 key = {Wolfram Research, Mathworld},
233 title = {Elliptic Curve},
236 type = {Math Dictionary Entry},
237 institution = I_Wolfram,
238 url = {http://mathworld.wolfram.com/EllipticCurve.html},
239 note = {Accessed 2013-12-12},
242 @misc{yarom2013flush+,
243 title = {Flush+ Reload: a high resolution, low noise, L3 cache side-channel attack},
244 author = {Yarom, Yuval and Falkner, Katrina},
246 publisher = {Cryptology ePrint Archive, Report 2013/448, 2013. http://eprint. iacr. org/2013/448/. 3},
247 url = {http://eprint.iacr.org/2013/448.pdf}
251 title = {BSI TR-02102 Kryptographische Verfahren},
252 author = {Bundesamt f\"ur Sicherheit in der Informationstechnik (BSI)},
255 url = {https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Publikationen/TechnischeRichtlinien/TR02102/BSI-TR-02102_pdf}
258 @techreport{ENISA2013,
259 title = {ENISA - Algorithms, Key Sizes and Parameters Report},
260 author = {{ENISA and Vincent Rijmen, Nigel P. Smart, Bogdan warinschi, Gaven Watson}},
263 url = {http://www.enisa.europa.eu/activities/identity-and-trust/library/deliverables/algorithms-key-sizes-and-parameters-report},
266 @book{anderson2008security,
267 title = {Security engineering},
268 author = {Anderson, Ross},
270 publisher = {Wiley.com},
271 url = {http://www.cl.cam.ac.uk/~rja14/book.html},
274 @misc{tschofenig-webpki,
275 author = {{H. Tschofenig and E. Lear}},
276 title = {{Evolving the Web Public Key Infrastructure}},
277 howpublished = {\url{http://tools.ietf.org/html/draft-tschofenig-iab-webpki-evolution-01.txt}},
282 @misc{diginotar-hack,
283 author = {{Elinor Mills}},
284 title = {{Fraudulent Google certificate points to Internet attack}},
285 howpublished = {\url{http://news.cnet.com/8301-27080\_3-20098894-245/fraudulent-google-certificate-points-to-internet-attack/}},
291 author = {{Damon Poeter}},
292 title = {{Fake Google Certificate Puts Gmail at Risk}},
293 howpublished = {\url{http://www.pcmag.com/article2/0,2817,2392063,00.asp}},
298 @misc{draft-ietf-websec-key-pinning,
299 author = {{C. Evans and C. Palmer}},
300 title = {{Public Key Pinning Extension for HTTP}},
301 howpublished = {\url{http://tools.ietf.org/html/draft-ietf-websec-key-pinning-09}},
307 author = {{Adam Langley, et. al.}},
308 title = {{Go X.509 Verification Source Code}},
309 howpublished = {\url{https://code.google.com/p/go/source/browse/src/pkg/crypto/x509/verify.go#173}},
314 @misc{certtransparency,
315 author = {{Adam Langley, Ben Laurie, Emilia Kasper}},
316 title = {{Certificate Transparency}},
317 howpublished = "\url{http://www.certificate-transparency.org}
318 \url{http://datatracker.ietf.org/doc/rfc6962/}",
323 @misc{snowdenGuardianGreenwald,
324 author = {{Glenn Greenwald}},
325 title = {{Edward Snowden: NSA whistleblower answers reader questions}},
326 howpublished = "\url{http://www.theguardian.com/world/2013/jun/17/edward-snowden-nsa-files-whistleblower},
327 \url{http://www.theguardian.com/world/2013/jun/17/edward-snowden-nsa-files-whistleblower}",
333 @InProceedings{https13,
334 author = {Zakir Durumeric and James Kasten and Michael Bailey and J. Alex Halderman},
335 title = {Analysis of the {HTTPS} Certificate Ecosystem},
336 booktitle = {Proceedings of the 13th Internet Measurement Conference},
339 url = {https://jhalderm.com/pub/papers/https-imc13.pdf},
342 @techreport{Wikipedia:TinyCA,
343 key = {Wikipedia:TinyCA},
345 institution = I_Wikipedia,
349 url = {http://en.wikipedia.org/wiki/TinyCA},
350 note = {Accessed 2013-12-24},