A Formal Treatment of Backdoored Pseudorandom Generators
From MaRDI portal
Publication:2948325
DOI10.1007/978-3-662-46800-5_5zbMath1365.94423OpenAlexW639928820MaRDI QIDQ2948325
Alexander Golovnev, Chaya Ganesh, Thomas Ristenpart, Yevgeniy Dodis, Ari Juels
Publication date: 30 September 2015
Published in: Advances in Cryptology -- EUROCRYPT 2015 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-662-46800-5_5
Related Items
Universally composable subversion-resilient cryptography, Cliptography: Clipping the Power of Kleptographic Attacks, NIZKs with an Untrusted CRS: Security in the Face of Parameter Subversion, Cryptographic Reverse Firewall via Malleable Smooth Projective Hash Functions, Reverse firewalls for oblivious transfer extension and applications to zero-knowledge, Reverse firewalls for adaptively secure MPC without setup, Steganography-free zero-knowledge, Subvert KEM to break DEM: practical algorithm-substitution attacks on public-key encryption, Cryptographic reverse firewalls for interactive proof systems, Subliminal Hash Channels, Immunization against complete subversion without random oracles, Modeling Random Oracles Under Unpredictable Queries, Subversion-resilient signatures: definitions, constructions and applications, Public-Seed Pseudorandom Permutations, Unnamed Item, Contention in Cryptoland: Obfuscation, Leakage and UCE, Point-Function Obfuscation: A Framework and Generic Constructions, Nonce-Based Key Agreement Protocol Against Bad Randomness, Cryptographic pseudorandom generators can make cryptosystems problematic, Message Transmission with Reverse Firewalls—Secure Communication on Corrupted Machines, Backdoors in Pseudorandom Number Generators: Possibility and Impossibility Results