1. Althouse J. 2019. TLS fingerprinting with JA3 and JA3S. Salesforce Engineering; https://engineering.salesforce.com/tls-fingerprinting-with-ja3-and-ja3s-247362855967. Althouse J. 2019. TLS fingerprinting with JA3 and JA3S. Salesforce Engineering; https://engineering.salesforce.com/tls-fingerprinting-with-ja3-and-ja3s-247362855967.
2. Barker , E.B. , Kelsey , J.M. , Recommendation for random number generation using deterministic random bit generators (revised). U.S. Department of Commerce , National Institute of Standards and Technology ; https://www.nist.gov/publications/recommendation-random-number-generation-using-deterministic-random-bit-generators-2. Barker, E.B., Kelsey, J.M., et al. 2007. Recommendation for random number generation using deterministic random bit generators (revised). U.S. Department of Commerce, National Institute of Standards and Technology; https://www.nist.gov/publications/recommendation-random-number-generation-using-deterministic-random-bit-generators-2.
3. Lecture Notes in Computer Science Essays, The New Codebreakers;Bernstein D.J.
4. Böck , H. , Zauner , A. , Devlin , S. , Somorovsky , J. , Jovanovic , P. 2016 . Nonce-disrespecting adversaries: practical forgery attacks on GCM in TLS . In 10th Usenix Workshop on Offensive Technologies; https://www.usenix.org/conference/woot16/workshop-program/presentation/bock. Böck, H., Zauner, A., Devlin, S., Somorovsky, J., Jovanovic, P. 2016. Nonce-disrespecting adversaries: practical forgery attacks on GCM in TLS. In 10th Usenix Workshop on Offensive Technologies; https://www.usenix.org/conference/woot16/workshop-program/presentation/bock.
5. Biased Nonce Sense: Lattice Attacks Against Weak ECDSA Signatures in Cryptocurrencies