eprint.iacr.org August 2019
08/24/2019
Dragonblood: Analyzing the Dragonfly Handshake of WPA3 and EAP-pwd
KNOB Attack: Key Negotiation of Bluetooth Attack: Breaking Bluetooth Security
knobattack.com August 2019
Analyzing Semantic Correctness with Symbolic Execution: A Case Study on PKCS#1 v1.5 Signature Verification
www.cs.purdue.edu August 2019
Kudelski Security to Showcase Industry’s First Purposefully Vulnerable Blockchain at Black Hat USA 2019
www.kudelskisecurity.com August 2019
New face of the Bank of England's £50 note is revealed as Alan Turing
www.bbc.com July 2019
Algorithmic aspects of elliptic bases in finite field discrete logarithm algorithms
eprint.iacr.org July 2019
Discrete logarithms in quasi-polynomial time in finite fields of fixed characteristic
eprint.iacr.org June 2019