Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

This is all true, but reads funny to me because I've implemented an intentionally vulnerable version of RSA and still had issues getting timing attacks to work on modern hardware (due to lack of sophistication in my approach, I think).


That actually sounds like a very enlightening exercise! How did you go about doing this? Did you just follow an RSA spec from somewhere?


I mostly followed lecture notes on the subject and a few papers on issues like prime checking.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: