Subliminal hash channels
From MaRDI portal
Publication:3294875
Recommendations
Cites work
- scientific article; zbMATH DE number 1617924 (Why is no real title available?)
- scientific article; zbMATH DE number 4191111 (Why is no real title available?)
- scientific article; zbMATH DE number 1088240 (Why is no real title available?)
- scientific article; zbMATH DE number 1107669 (Why is no real title available?)
- scientific article; zbMATH DE number 1753854 (Why is no real title available?)
- scientific article; zbMATH DE number 1394306 (Why is no real title available?)
- A Kilobit Hidden SNFS Discrete Logarithm Computation
- A formal treatment of backdoored pseudorandom generators
- Advances in Cryptology – CRYPTO 2004
- Cliptography: clipping the power of kleptographic attacks
- Controlled randomness -- a defense against backdoors in cryptographic devices
- How to Time-Stamp a Digital Document
- Lattice Klepto -- turning post-quantum crypto against itself
- Managing your kleptographic subscription plan
- Number-theoretic constructions of efficient pseudo-random functions
- Security of symmetric encryption against mass surveillance
- Security proofs for signature schemes
- Stochastic kleptography detection
- The dark side of ``black-box cryptography or: should we trust Capstone?
Cited in
(7)- scientific article; zbMATH DE number 3959274 (Why is no real title available?)
- Subliminal channels and information security in Computer Systems
- An algorithm for a subliminal channel safety construction based on the EIGamal signature
- scientific article; zbMATH DE number 4072863 (Why is no real title available?)
- RSA signature schemes with subliminal-free public key
- Subliminal channels in the NTRU and the subliminal-free methods
- Selected Areas in Cryptography
This page was built for publication: Subliminal hash channels
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3294875)