The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for kleptography with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1997-2022 (15)
Publication types (Num. hits)
article(1) inproceedings(13) phdthesis(1)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 49 occurrences of 29 keywords

Results
Found 15 publication records. Showing 15 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
111Adam L. Young, Moti Yung Kleptography: Using Cryptography Against Cryptography. Search on Bibsonomy EUROCRYPT The full citation details ... 1997 DBLP  DOI  BibTeX  RDF Cryptanalytic attacks, leakage bandwidth, design and manufacturing of cryptographic devices and software, black-box devices, SETUP mechanisms, RSA, randomness, information hiding, pseudorandomness, Diffie-Hellman, subliminal channels, kleptography, Discrete Log
100Adam L. Young, Moti Yung Malicious Cryptography: Kleptographic Aspects. Search on Bibsonomy CT-RSA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Rabin, malicious cryptography, RSA, public key cryptography, attacks, random oracle, security threats, kleptography, SETUP
61Adam L. Young, Moti Yung Space-Efficient Kleptography Without Random Oracles. Search on Bibsonomy Information Hiding The full citation details ... 2007 DBLP  DOI  BibTeX  RDF twisted elliptic curves, elliptic curve, Key exchange, kleptography
50Marcin Gogolewski, Marek Klonowski, Przemyslaw Kubiak 0001, Miroslaw Kutylowski, Anna Lauks, Filip Zagórski Kleptographic Attacks on E-Voting Schemes. Search on Bibsonomy ETRICS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF receipt voting, election integrity, verifiable pseudo-randomness, electronic voting, coercion, kleptography
50Adam L. Young, Moti Yung Backdoor Attacks on Black-Box Ciphers Exploiting Low-Entropy Plaintexts. Search on Bibsonomy ACISP The full citation details ... 2003 DBLP  DOI  BibTeX  RDF hidden ciphers, obfuscated ciphers, black-box ciphers, Huffman compression, reverse-engineering, data compression, entropy, subliminal channel, Digital Rights Management (DRM), Symmetric ciphers, kleptography
50Adam L. Young, Moti Yung The Prevalence of Kleptographic Attacks on Discrete-Log Based Cryptosystems. Search on Bibsonomy CRYPTO The full citation details ... 1997 DBLP  DOI  BibTeX  RDF DSA signature, Menezes-Vanstone PKCS, Schnorr signature algorithm, protocol abuse, leakage-bandwidth, cryptographic system implementations, randomness, pseudorandomness, Diffie-Hellman, subliminal channels, kleptography, setup, ElGamal encryption, ElGamal signature, Discrete-Log
36Carina Heßeling, Jörg Keller 0001, Sebastian Litzinger Kleptography in Authentication Protocols: Why is it Still Possible? Search on Bibsonomy EICC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
36Nasser Al-Salami Kleptography and steganography in blockchains. Search on Bibsonomy 2020   RDF
36Bohdan Kovalenko, Anton Kudin Kleptography trapdoor free cryptographic protocols. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2018 DBLP  BibTeX  RDF
36Adam Janovsky, Jan Krhovjak, Vashek Matyas Bringing Kleptography to Real-World TLS. Search on Bibsonomy WISTP The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
36Adam L. Young, Moti Yung Kleptography from Standard Assumptions and Applications. Search on Bibsonomy SCN The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
26Marc Joye RSA Moduli with a Predetermined Portion: Techniques and Applications. Search on Bibsonomy ISPEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF RSA-type cryptosystems, RSA moduli, RSA key lengths, diminished-radix moduli, key transport, key storage, key transmission, tamper-resistant devices, smart cards, key escrow, key generation, kleptography, setup, key compression
26Przemyslaw Kubiak 0001, Miroslaw Kutylowski, Filip Zagórski Kleptographic attacks on a cascade of mix servers. Search on Bibsonomy AsiaCCS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF cascade of mix servers, anonymity, electronic voting, kleptography
26Adam L. Young, Moti Yung A Timing-Resistant Elliptic Curve Backdoor in RSA. Search on Bibsonomy Inscrypt The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Twisted elliptic curves, RSA, subliminal channel, kleptography
25Adam L. Young, Moti Yung An Elliptic Curve Backdoor Algorithm for RSASSA. Search on Bibsonomy Information Hiding The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #15 of 15 (100 per page; Change: )
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license