@misc{rfc6528,
    author="F. Gont and S. Bellovin",
    title="{Defending against Sequence Number Attacks}",
    series="Request for Comments",
    number="6528",
    howpublished="RFC 6528 (Proposed Standard)",
    publisher="IETF",
    organization="Internet Engineering Task Force",
    year=2012,
    month=feb,
    url="http://www.ietf.org/rfc/rfc6528.txt",
}

@misc{rfc6101,
    author="A. Freier and P. Karlton and P. Kocher",
    title="{The Secure Sockets Layer (SSL) Protocol Version 3.0}",
    series="Request for Comments",
    number="6101",
    howpublished="RFC 6101 (Historic)",
    publisher="IETF",
    organization="Internet Engineering Task Force",
    year=2011,
    month=aug,
    url="http://www.ietf.org/rfc/rfc6101.txt",
}


@inproceedings{joncheray1995simple,
    title={A Simple Active Attack Against TCP.},
    author={Joncheray, Laurent},
    booktitle={USENIX Security},
    year={1995}
}

@article{lenstra2012ron,
    title={Ron was wrong, Whit is right.},
    author={Lenstra, Arjen K and Hughes, James P and Augier, Maxime and Bos, Joppe W and Kleinjung, Thorsten and Wachter, Christophe},
    journal={IACR Cryptology ePrint Archive},
    volume={2012},
    pages={64},
    year={2012}
}

@inproceedings{heninger2012mining,
    title={Mining Your Ps and Qs: Detection of Widespread Weak Keys in Network Devices.},
    author={Heninger, Nadia and Durumeric, Zakir and Wustrow, Eric and Halderman, J Alex},
    booktitle={USENIX Security Symposium},
    pages={205--220},
    year={2012}
}

@misc{bernstein2012rsa,
    title={The State of Factoring Algorithms and other cryptanalytic threats to RSA},
    author={Bernstein, Daniel J. and Heninger, Nadia and Lange, Tanje},
    note={http://www.hyperelliptic.org/tanja/vortraege/facthacks-RSA.pdf}
}
