Completed
Implementing the attack
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Polynonce: A Novel ECDSA Attack and Vulnerability Analysis
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 Digital signatures - the basics
- 3 ECDSA (keygen, sign, verify)
- 4 Bad RNGs - let's pick one
- 5 Polynonce - Requirements in practice
- 6 Bitcoin - Computing the message
- 7 Bitcoin - Obtaining the data
- 8 Ethereum - Computing the message
- 9 Ethereum - Obtaining the data
- 10 Sample of TLS servers
- 11 Minerva datasets
- 12 Implementing the attack
- 13 Results - Bitcoin and Ethereum
- 14 Results - TLS, Minerva