|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 49 occurrences of 29 keywords
|
|
|
Results
Found 15 publication records. Showing 15 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
111 | Adam L. Young, Moti Yung |
Kleptography: Using Cryptography Against Cryptography. |
EUROCRYPT |
1997 |
DBLP DOI BibTeX RDF |
Cryptanalytic attacks, leakage bandwidth, design and manufacturing of cryptographic devices and software, black-box devices, SETUP mechanisms, RSA, randomness, information hiding, pseudorandomness, Diffie-Hellman, subliminal channels, kleptography, Discrete Log |
100 | Adam L. Young, Moti Yung |
Malicious Cryptography: Kleptographic Aspects. |
CT-RSA |
2005 |
DBLP DOI BibTeX RDF |
Rabin, malicious cryptography, RSA, public key cryptography, attacks, random oracle, security threats, kleptography, SETUP |
61 | Adam L. Young, Moti Yung |
Space-Efficient Kleptography Without Random Oracles. |
Information Hiding |
2007 |
DBLP DOI BibTeX RDF |
twisted elliptic curves, elliptic curve, Key exchange, kleptography |
50 | Marcin Gogolewski, Marek Klonowski, Przemyslaw Kubiak 0001, Miroslaw Kutylowski, Anna Lauks, Filip Zagórski |
Kleptographic Attacks on E-Voting Schemes. |
ETRICS |
2006 |
DBLP DOI BibTeX RDF |
receipt voting, election integrity, verifiable pseudo-randomness, electronic voting, coercion, kleptography |
50 | Adam L. Young, Moti Yung |
Backdoor Attacks on Black-Box Ciphers Exploiting Low-Entropy Plaintexts. |
ACISP |
2003 |
DBLP DOI BibTeX RDF |
hidden ciphers, obfuscated ciphers, black-box ciphers, Huffman compression, reverse-engineering, data compression, entropy, subliminal channel, Digital Rights Management (DRM), Symmetric ciphers, kleptography |
50 | Adam L. Young, Moti Yung |
The Prevalence of Kleptographic Attacks on Discrete-Log Based Cryptosystems. |
CRYPTO |
1997 |
DBLP DOI BibTeX RDF |
DSA signature, Menezes-Vanstone PKCS, Schnorr signature algorithm, protocol abuse, leakage-bandwidth, cryptographic system implementations, randomness, pseudorandomness, Diffie-Hellman, subliminal channels, kleptography, setup, ElGamal encryption, ElGamal signature, Discrete-Log |
36 | Carina Heßeling, Jörg Keller 0001, Sebastian Litzinger |
Kleptography in Authentication Protocols: Why is it Still Possible? |
EICC |
2022 |
DBLP DOI BibTeX RDF |
|
36 | Nasser Al-Salami |
Kleptography and steganography in blockchains. |
|
2020 |
RDF |
|
36 | Bohdan Kovalenko, Anton Kudin |
Kleptography trapdoor free cryptographic protocols. |
IACR Cryptol. ePrint Arch. |
2018 |
DBLP BibTeX RDF |
|
36 | Adam Janovsky, Jan Krhovjak, Vashek Matyas |
Bringing Kleptography to Real-World TLS. |
WISTP |
2018 |
DBLP DOI BibTeX RDF |
|
36 | Adam L. Young, Moti Yung |
Kleptography from Standard Assumptions and Applications. |
SCN |
2010 |
DBLP DOI BibTeX RDF |
|
26 | Marc Joye |
RSA Moduli with a Predetermined Portion: Techniques and Applications. |
ISPEC |
2008 |
DBLP DOI BibTeX RDF |
RSA-type cryptosystems, RSA moduli, RSA key lengths, diminished-radix moduli, key transport, key storage, key transmission, tamper-resistant devices, smart cards, key escrow, key generation, kleptography, setup, key compression |
26 | Przemyslaw Kubiak 0001, Miroslaw Kutylowski, Filip Zagórski |
Kleptographic attacks on a cascade of mix servers. |
AsiaCCS |
2007 |
DBLP DOI BibTeX RDF |
cascade of mix servers, anonymity, electronic voting, kleptography |
26 | Adam L. Young, Moti Yung |
A Timing-Resistant Elliptic Curve Backdoor in RSA. |
Inscrypt |
2007 |
DBLP DOI BibTeX RDF |
Twisted elliptic curves, RSA, subliminal channel, kleptography |
25 | Adam L. Young, Moti Yung |
An Elliptic Curve Backdoor Algorithm for RSASSA. |
Information Hiding |
2006 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #15 of 15 (100 per page; Change: )
|
|