1. Strengthening the security of authenticated key exchange against bad randomness;Feltz;Des. Codes Cryptogr.,2018
2. Robust digital signature revisited;Cui;Theor. Comput. Sci.,2020
3. Related Randomness Attacks for Public Key Encryption;Paterson;Public Key Cryptography,2014
4. Heninger, N., Durumeric, Z., Wustrow, E., and Halderman, J.A. (2012, January 8–10). Mining Your Ps and Qs: Detection of Widespread Weak Keys in Network Devices. Proceedings of the USENIX Security Symposium, Bellevue, WA, USA.
5. Public Keys;Lenstra;Proceedings of the CRYPTO,2012