From 564089af1a39e3aa587d789f15fa2ea3e3256e05 Mon Sep 17 00:00:00 2001 From: matta Date: Fri, 26 Aug 2022 22:14:06 +0900 Subject: [PATCH] Update README.md --- 2022_Hackers_Playground/SecureRunner2/README.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/2022_Hackers_Playground/SecureRunner2/README.md b/2022_Hackers_Playground/SecureRunner2/README.md index 4c23fd1..3d57ef5 100644 --- a/2022_Hackers_Playground/SecureRunner2/README.md +++ b/2022_Hackers_Playground/SecureRunner2/README.md @@ -33,4 +33,4 @@ And generate corrupted signatures with modified `n`. Now that we have 6 normal/abnormal signature pairs, factorizing `n` is possible by using Modulus Fault Attack based on LLL. Reference: - - Modulus Fault Attacks Against RSA-CRT Signatures([talk](https://www.normalesup.org/~tibouchi/papers/talk-modulusfault.pdf), [paper](https://eprint.iacr.org/2011/388.pdf) + - Modulus Fault Attacks Against RSA-CRT Signatures([talk](https://www.normalesup.org/~tibouchi/papers/talk-modulusfault.pdf), [paper](https://eprint.iacr.org/2011/388.pdf))