Cryptography as an attack technology: proving the RSA/factoring kleptographic attack
From MaRDI portal
Publication:2803633
DOI10.1007/978-3-662-49301-4_16zbMATH Open1405.94092OpenAlexW2469488491MaRDI QIDQ2803633FDOQ2803633
Publication date: 2 May 2016
Published in: The New Codebreakers (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-662-49301-4_16
Recommendations
RSAinteger factorizationpublic key cryptographyrandom oraclesetupattacksRabinkleptographysecurity threatsmalicious cryptography
Cites Work
- A method for obtaining digital signatures and public-key cryptosystems
- Title not available (Why is that?)
- Advances in Cryptology - EUROCRYPT 2004
- The Dark Side of “Black-Box” Cryptography or: Should We Trust Capstone?
- Title not available (Why is that?)
- Topics in Cryptology – CT-RSA 2005
- Title not available (Why is that?)
Cited In (2)
This page was built for publication: Cryptography as an attack technology: proving the RSA/factoring kleptographic attack
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2803633)