How to Encrypt with a Malicious Random Number Generator
From MaRDI portal
Publication:3525681
DOI10.1007/978-3-540-71039-4_19zbMath1154.68397OpenAlexW1598210976MaRDI QIDQ3525681
Publication date: 18 September 2008
Published in: Fast Software Encryption (Search for Journal in Brave)
Full work available at URL: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.542.4764
Cryptography (94A60) Data encryption (aspects in computer science) (68P25) Authentication, digital signatures and secret sharing (94A62)
Related Items
Strengthening the security of authenticated key exchange against bad randomness, On the impossibility of cryptography with tamperable randomness, Selective-Opening Security in the Presence of Randomness Failures, Secrecy Without Perfect Randomness: Cryptography with (Bounded) Weak Sources, Randomness Leakage in the KEM/DEM Framework