Cryptography as an attack technology: proving the RSA/factoring kleptographic attack
From MaRDI portal
Publication:2803633
Recommendations
Cites work
- scientific article; zbMATH DE number 1302781 (Why is no real title available?)
- scientific article; zbMATH DE number 1088240 (Why is no real title available?)
- scientific article; zbMATH DE number 1962166 (Why is no real title available?)
- A method for obtaining digital signatures and public-key cryptosystems
- Advances in Cryptology - EUROCRYPT 2004
- The dark side of ``black-box cryptography or: should we trust Capstone?
- Topics in Cryptology – CT-RSA 2005
Cited in
(6)- The dark side of ``black-box cryptography or: should we trust Capstone?
- Cliptography: clipping the power of kleptographic attacks
- How to use un-trusty cryptographic devices
- scientific article; zbMATH DE number 2102677 (Why is no real title available?)
- Information Security
- Topics in Cryptology – CT-RSA 2005
This page was built for publication: Cryptography as an attack technology: proving the RSA/factoring kleptographic attack
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2803633)