Subvert KEM to break DEM: practical algorithm-substitution attacks on public-key encryption
From MaRDI portal
Publication:2692378
DOI10.1007/978-3-030-64834-3_4OpenAlexW3089693180MaRDI QIDQ2692378
Rongmao Chen, Xin-Yi Huang, Mordechai M. Yung
Publication date: 21 March 2023
Full work available at URL: https://doi.org/10.1007/978-3-030-64834-3_4
Related Items (3)
Reverse firewalls for adaptively secure MPC without setup ⋮ Subverting deniability ⋮ Subversion-resilient public key encryption with practical watchdogs
Cites Work
- Unnamed Item
- Unnamed Item
- Anonymous attestation with subverted TPMs
- Lattice Klepto -- turning post-quantum crypto against itself
- KEM combiners
- Public-key encryption resistant to parameter subversion and its realization from efficiently-embeddable groups
- Correcting subverted random oracles
- Subverting decryption in AEAD
- Let a non-barking watchdog bite: cliptographic signatures with an offline watchdog
- Public immunization against complete subversion without random oracles
- Message Transmission with Reverse Firewalls—Secure Communication on Corrupted Machines
- Security of Symmetric Encryption against Mass Surveillance
- Lattice Cryptography for the Internet
- A More Cautious Approach to Security Against Mass Surveillance
- A Formal Treatment of Backdoored Pseudorandom Generators
- Resisting Randomness Subversion: Fast Deterministic and Hedged Public-Key Encryption in the Standard Model
- Cryptographic Reverse Firewalls
- Cliptography: Clipping the Power of Kleptographic Attacks
- Cryptographic Reverse Firewall via Malleable Smooth Projective Hash Functions
- Round-Optimal Password-Based Authenticated Key Exchange
- The Dark Side of “Black-Box” Cryptography or: Should We Trust Capstone?
- Secure Hybrid Encryption from Weakened Key Encapsulation
- Advances in Cryptology – CRYPTO 2004
- Advances in Cryptology – CRYPTO 2004
This page was built for publication: Subvert KEM to break DEM: practical algorithm-substitution attacks on public-key encryption