2 {\hyperref{http://polarssl.org/}{}{}{PolarSSL}}
5 {\hyperref{http://wikipedia.org/}{}{}{Wikipedia}}
8 {\hyperref{http://tomacs.acm.org/}{}{}{ACM}
9 \hyperref{http://tomacs.acm.org/}{}{}{Transactions}
10 \hyperref{http://tomacs.acm.org/}{}{}{on}
11 \hyperref{http://tomacs.acm.org/}{}{}{Modeling}
12 \hyperref{http://tomacs.acm.org/}{}{}{and}
13 \hyperref{http://tomacs.acm.org/}{}{}{Computer}
14 \hyperref{http://tomacs.acm.org/}{}{}{Simulation}}
17 @inproceedings{HDWH12,
18 author = {Nadia Heninger and Zakir Durumeric and Eric Wustrow
19 and J. Alex Halderman},
20 title = {Mining Your {P}s and {Q}s: {D}etection of Widespread Weak Keys
22 booktitle = {Proceedings of the 21st {USENIX} Security Symposium},
25 url = {https://factorable.net/weakkeys12.extended.pdf},
28 @techreport{Wikipedia:/dev/random,
29 key = {Wikipedia:/dev/random},
30 title = {/dev/random},
31 institution = I_Wikipedia,
35 url = {http://en.wikipedia.org/wiki/dev/random},
36 note = {Accessed 2013-12-06},
40 author = {A. Seznec and N. Sendrier},
41 title = {{HAVEGE}: a user-level software heuristic for generating
42 empirically strong random numbers},
49 url = {http://www.irisa.fr/caps/projects/hipsor/scripts/down.php?id=13781296&ext=.pdf},
53 author = {Jakob Engblom},
54 title = {Evaluating {HAVEGE} Randomness},
57 type = {Blog: Observations from Uppsala},
58 url = {http://jakob.engbloms.se/archives/1374},
63 title = {Weak random number generation within virtualized
65 institution = I_PolarSSL,
68 type = {Security Advisory},
70 url = {https://polarssl.org/tech-updates/security-advisories/polarssl-security-advisory-2011-02},
75 title = {haveged -- A simple entropy daemon},
78 type = {Software Homepage},
79 url = {http://www.issihosts.com/haveged/},
80 note = {Accessed 2013-12-06},
85 title = {haveged -- A simple entropy daemon: Runtime Testing},
88 type = {Technical Background},
89 url = {http://www.issihosts.com/haveged/},
90 note = {Accessed 2013-12-06},
93 @book{katz2008introduction,
94 title={Introduction to modern cryptography},
95 author={Katz, J. and Lindell, Y.},
98 series={Chapman and Hall/CRC Cryptography and Network Security Series},
99 url={http://books.google.at/books?id=WIc\_AQAAIAAJ},
101 publisher={Chapman \& Hall/CRC}
105 author="T. Kivinen and M. Kojo",
106 title="{More Modular Exponential (MODP) Diffie-Hellman groups for Internet Key Exchange (IKE)}",
107 series="Request for Comments",
109 howpublished="RFC 3526 (Proposed Standard)",
111 organization="Internet Engineering Task Force",
114 url="http://www.ietf.org/rfc/rfc3526.txt",
119 title = {SafeCurves: choosing safe curves for elliptic-curve cryptography},
122 type = {Technical Background},
123 url = {http://safecurves.cr.yp.to/rigid.html},
124 note = {Accessed 2013-12-09},
127 @techreport{Wikipedia:ExportCipher,
128 key = {Wikipedia:ExportCipher},
129 title = {Export of cryptography in the United States},
130 institution = I_Wikipedia,
134 url = {http://en.wikipedia.org/wiki/Export_of_cryptography_in_the_United_States},
135 note = {Accessed 2013-12-09},