Polynonce: A Novel ECDSA Attack and Vulnerability Analysis

Polynonce: A Novel ECDSA Attack and Vulnerability Analysis

DEFCONConference via YouTube Direct link

Bitcoin - Obtaining the data

7 of 14

7 of 14

Bitcoin - Obtaining the data

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Polynonce: A Novel ECDSA Attack and Vulnerability Analysis

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 Digital signatures - the basics
  3. 3 ECDSA (keygen, sign, verify)
  4. 4 Bad RNGs - let's pick one
  5. 5 Polynonce - Requirements in practice
  6. 6 Bitcoin - Computing the message
  7. 7 Bitcoin - Obtaining the data
  8. 8 Ethereum - Computing the message
  9. 9 Ethereum - Obtaining the data
  10. 10 Sample of TLS servers
  11. 11 Minerva datasets
  12. 12 Implementing the attack
  13. 13 Results - Bitcoin and Ethereum
  14. 14 Results - TLS, Minerva

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.