A more cautious approach to security against mass surveillance
From MaRDI portal
Publication:2946964
Recommendations
Cited in
(19)- Reverse firewalls for adaptively secure MPC without setup
- Message transmission with reverse firewalls -- secure communication on corrupted machines
- Backdoors in pseudorandom number generators: possibility and impossibility results
- Subversion-resilient signatures: definitions, constructions and applications
- Immunization against complete subversion without random oracles
- Subversion-resilient authenticated encryption without random oracles
- Sacrificing civil liberties to reduce terrorism risks
- Sender-anamorphic encryption reformulated: achieving robust and generic constructions
- Security of symmetric encryption against mass surveillance
- Cryptographic reverse firewalls for interactive proof systems
- On the gold standard for security of universal steganography
- Subverting decryption in AEAD
- Subversion-resilient public key encryption with practical watchdogs
- Cliptography: clipping the power of kleptographic attacks
- UC-secure cryptographic reverse firewall-guarding corrupted systems with the minimum trusted module
- Taming Big Brother Ambitions: More Privacy for Secret Handshakes
- Subvert KEM to break DEM: practical algorithm-substitution attacks on public-key encryption
- Sequential digital signatures for cryptographic software-update authentication
- Subversion-resilient signatures without random oracles
This page was built for publication: A more cautious approach to security against mass surveillance
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2946964)