|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 49 occurrences of 29 keywords
|
|
|
Results
Found 15 publication records. Showing 15 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
111 | Adam L. Young, Moti Yung |
Kleptography: Using Cryptography Against Cryptography.  |
EUROCRYPT  |
1997 |
DBLP DOI BibTeX RDF |
Cryptanalytic attacks, leakage bandwidth, design and manufacturing of cryptographic devices and software, black-box devices, SETUP mechanisms, RSA, randomness, information hiding, pseudorandomness, Diffie-Hellman, subliminal channels, kleptography, Discrete Log |
100 | Adam L. Young, Moti Yung |
Malicious Cryptography: Kleptographic Aspects.  |
CT-RSA  |
2005 |
DBLP DOI BibTeX RDF |
Rabin, malicious cryptography, RSA, public key cryptography, attacks, random oracle, security threats, kleptography, SETUP |
61 | Adam L. Young, Moti Yung |
Space-Efficient Kleptography Without Random Oracles.  |
Information Hiding  |
2007 |
DBLP DOI BibTeX RDF |
twisted elliptic curves, elliptic curve, Key exchange, kleptography |
50 | Marcin Gogolewski, Marek Klonowski, Przemyslaw Kubiak 0001, Miroslaw Kutylowski, Anna Lauks, Filip Zagórski |
Kleptographic Attacks on E-Voting Schemes.  |
ETRICS  |
2006 |
DBLP DOI BibTeX RDF |
receipt voting, election integrity, verifiable pseudo-randomness, electronic voting, coercion, kleptography |
50 | Adam L. Young, Moti Yung |
Backdoor Attacks on Black-Box Ciphers Exploiting Low-Entropy Plaintexts.  |
ACISP  |
2003 |
DBLP DOI BibTeX RDF |
hidden ciphers, obfuscated ciphers, black-box ciphers, Huffman compression, reverse-engineering, data compression, entropy, subliminal channel, Digital Rights Management (DRM), Symmetric ciphers, kleptography |
50 | Adam L. Young, Moti Yung |
The Prevalence of Kleptographic Attacks on Discrete-Log Based Cryptosystems.  |
CRYPTO  |
1997 |
DBLP DOI BibTeX RDF |
DSA signature, Menezes-Vanstone PKCS, Schnorr signature algorithm, protocol abuse, leakage-bandwidth, cryptographic system implementations, randomness, pseudorandomness, Diffie-Hellman, subliminal channels, kleptography, setup, ElGamal encryption, ElGamal signature, Discrete-Log |
36 | Carina Heßeling, Jörg Keller 0001, Sebastian Litzinger |
Kleptography in Authentication Protocols: Why is it Still Possible?  |
EICC  |
2022 |
DBLP DOI BibTeX RDF |
|
36 | Nasser Al-Salami |
Kleptography and steganography in blockchains.  |
|
2020 |
RDF |
|
36 | Bohdan Kovalenko, Anton Kudin |
Kleptography trapdoor free cryptographic protocols.  |
IACR Cryptol. ePrint Arch.  |
2018 |
DBLP BibTeX RDF |
|
36 | Adam Janovsky, Jan Krhovjak, Vashek Matyas |
Bringing Kleptography to Real-World TLS.  |
WISTP  |
2018 |
DBLP DOI BibTeX RDF |
|
36 | Adam L. Young, Moti Yung |
Kleptography from Standard Assumptions and Applications.  |
SCN  |
2010 |
DBLP DOI BibTeX RDF |
|
26 | Marc Joye |
RSA Moduli with a Predetermined Portion: Techniques and Applications.  |
ISPEC  |
2008 |
DBLP DOI BibTeX RDF |
RSA-type cryptosystems, RSA moduli, RSA key lengths, diminished-radix moduli, key transport, key storage, key transmission, tamper-resistant devices, smart cards, key escrow, key generation, kleptography, setup, key compression |
26 | Przemyslaw Kubiak 0001, Miroslaw Kutylowski, Filip Zagórski |
Kleptographic attacks on a cascade of mix servers.  |
AsiaCCS  |
2007 |
DBLP DOI BibTeX RDF |
cascade of mix servers, anonymity, electronic voting, kleptography |
26 | Adam L. Young, Moti Yung |
A Timing-Resistant Elliptic Curve Backdoor in RSA.  |
Inscrypt  |
2007 |
DBLP DOI BibTeX RDF |
Twisted elliptic curves, RSA, subliminal channel, kleptography |
25 | Adam L. Young, Moti Yung |
An Elliptic Curve Backdoor Algorithm for RSASSA.  |
Information Hiding  |
2006 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #15 of 15 (100 per page; Change: )
|
|