March 5, 2010

Hardware Attack on RSA Implementation

Researchers have shown how, in one specific case, it is possible to calculate the private key from specific erroneous RSA signatures. Whether the attack has practical utility is questionable...
 
Read more at The H
Click Here!