Dual EC: a standardized back door
From MaRDI portal
Publication:2803634
Recommendations
Cited in
(14)- An analysis of NIST SP 800-90A
- A formal treatment of backdoored pseudorandom generators
- Backdoors in pseudorandom number generators: possibility and impossibility results
- Kleptographic (algorithmic) backdoors in the RSA key generator
- Lattice Klepto -- turning post-quantum crypto against itself
- The MALICIOUS framework: embedding backdoors into tweakable block ciphers
- The NSA back door to NIST
- On the possibility of a backdoor in the Micali-Schnorr generator
- SCRAPE: scalable randomness attested by public entities
- DiSSECT: distinguisher of standard and simulated elliptic curves via traits
- Constructing and deconstructing intentional weaknesses in symmetric ciphers
- How to backdoor (classic) McEliece and how to guard against backdoors
- Strengthening the security of authenticated key exchange against bad randomness
- Fast modular reduction and squaring in \(\mathrm{GF}(2^m)\)
This page was built for publication: Dual EC: a standardized back door
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2803634)