In this work, we conduct the first comprehensive analysis of cryptographic libraries and the vulnerabilities affecting them. We collect data from the National Vulnerability Database, individual project repositories and mailing lists, and other relevant sources for eight widely used cryptographic libraries. 2021: Jenny Blessing, Michael A. Specter, D. Weitzner https://arxiv.org/pdf/2107.04940.pdf
view more