Pages that link to "Item:Q2874493"
From MaRDI portal
The following pages link to Security of Symmetric Encryption against Mass Surveillance (Q2874493):
Displaying 26 items.
- On the gold standard for security of universal steganography (Q1648780) (← links)
- On the impossibility of cryptography with tamperable randomness (Q1688399) (← links)
- Subversion-resilient signatures: definitions, constructions and applications (Q1989360) (← links)
- Subversion-resilient public key encryption with practical watchdogs (Q2061938) (← links)
- Practical algorithm substitution attack on extractable signatures (Q2119943) (← links)
- UC-secure cryptographic reverse firewall-guarding corrupted systems with the minimum trusted module (Q2151289) (← links)
- Subversion-resilient enhanced privacy ID (Q2152180) (← links)
- Universally composable subversion-resilient cryptography (Q2170002) (← links)
- Anamorphic encryption: private communication against a dictator (Q2170036) (← links)
- On the universal steganography of optimal rate (Q2216130) (← links)
- Cryptographic reverse firewalls for interactive proof systems (Q2220883) (← links)
- Immunization against complete subversion without random oracles (Q2227487) (← links)
- Subvert KEM to break DEM: practical algorithm-substitution attacks on public-key encryption (Q2692378) (← links)
- Assisted Identification of Mode of Operation in Binary Code with Dynamic Data Flow Slicing (Q2822697) (← links)
- Message Transmission with Reverse Firewalls—Secure Communication on Corrupted Machines (Q2835593) (← links)
- Big-Key Symmetric Encryption: Resisting Key Exfiltration (Q2835594) (← links)
- Backdoors in Pseudorandom Number Generators: Possibility and Impossibility Results (Q2835595) (← links)
- Cliptography: Clipping the Power of Kleptographic Attacks (Q2953772) (← links)
- NIZKs with an Untrusted CRS: Security in the Face of Parameter Subversion (Q2953796) (← links)
- Cryptographic Reverse Firewall via Malleable Smooth Projective Hash Functions (Q2958150) (← links)
- Subliminal Hash Channels (Q3294875) (← links)
- Stand-by Attacks on E-ID Password Authentication (Q3454602) (← links)
- Verifiable Side-Channel Security of Cryptographic Implementations: Constant-Time MEE-CBC (Q4639476) (← links)
- (Q5090419) (← links)
- Security of Auditing Protocols Against Subversion Attacks (Q5859735) (← links)
- Backdoor-resistant identity-based proxy re-encryption for cloud-assisted wireless body area networks (Q6191626) (← links)