Hi,

> The first step of our attack involves attacker controlled content. So yes 
> (phishing, unauthenticated HTTP, selective company DPI etc.). In our example 
> we use a local proxy to carry out the attack. I hope I can post a full 
> version of the actual paper and PoC to this thread soon.

https://eprint.iacr.org/2016/475
https://github.com/nonce-disrespect/nonce-disrespect

(data-sets should be indexed by scans.io in a bit)

Aaron

Attachment: signature.asc
Description: Message signed with OpenPGP using GPGMail

_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to