@dblp

Recovering Private Keys Generated with Weak PRNGs.

, , and . IMACC, volume 8308 of Lecture Notes in Computer Science, page 158-172. Springer, (2013)

Links and resources

Tags