Examining CVE-2020-0601 Crypt32.dll Elliptic Curve Cryptography (ECC) Certificate Validation Vulnerability

Since its inception, asymmetric cryptography use cases include public key encryption, the construction of a secure channel to share a session key, and the act of digital signing. X.509 is the most prevalent standard for public key certificates in internet protocols. While compatible with a diverse...
By
Maksim Dubyk
March 2, 2022

All papers are copyrighted. No re-posting of papers is permitted

470x382_Research_Paper_gray.jpg