How is NSA breaking into VPNs?
Brian Gladman
brg at gladman.plus.com
Fri Oct 16 17:29:05 BST 2015
An interesting paper on the weaknesses of DH key exchange protocols:
https://weakdh.org/imperfect-forward-secrecy-ccs15.pdf
More information about the ukcrypto
mailing list