Mitigating Insider Threats to RSA Key Generation

@inproceedings{Young2004MitigatingIT,
  title={Mitigating Insider Threats to RSA Key Generation},
  author={Adam Young and Chris J. Mitchell},
  year={2004}
}
RSA keys form the cornerstone for numerous security systems. They provide for confidentiality of communications as well as non-repudiability of digital signatures. However, there are several insider attacks against RSA key generation that can have devastating effects when carried out. In this paper we address such attacks by surveying measures that can be taken to mitigate insider attacks against RSA generation. II. Secure Verification of Location Claims Naveen Sastry, Umesh Shankar, David… CONTINUE READING

From This Paper

Figures, tables, and topics from this paper.

References

Publications referenced by this paper.
Showing 1-10 of 19 references

Secure verification of location claims

Workshop on Wireless Security • 2003
View 6 Excerpts
Highly Influenced

How to Prove Where You Are: Tracking the Location of Customer Equipment

ACM Conference on Computer and Communications Security • 1998
View 5 Excerpts
Highly Influenced

Wireless LAN location-sensing for security applications

Workshop on Wireless Security • 2003
View 3 Excerpts
Highly Influenced

Zero-interaction authentication

View 4 Excerpts
Highly Influenced

Vulnerability Assessment of the Transportation Infrastructure

John A. Volpe
Relying on the Global Positioning System, • 2001
View 3 Excerpts
Highly Influenced

Creating Web Representations for Places

View 4 Excerpts
Highly Influenced

Similar Papers

Loading similar papers…