Imperfect Forward Secrecy: How Diffie-Hellman Fails in Practice
We investigate the security of Diffie-Hellman key exchange as used in popular Internet protocols and find it to be less secure than widely believed.
Imperfect Forward Secrecy: How Diffie-Hellman Fails in Practice
Where Did I Leave My Keys?: Lessons from the Juniper Dual EC Incident
Lest We Remember: Cold-Boot Attacks on Encryption Keys
ACM encourages its members to take a direct hand in shaping the future of the association. There are more ways than ever to get involved.
Get Involved