Subliminal Hash Channels
From MaRDI portal
Publication:3294875
DOI10.1007/978-3-030-36237-9_9zbMATH Open1457.94083OpenAlexW2982500592MaRDI QIDQ3294875FDOQ3294875
Publication date: 29 June 2020
Published in: Algebra, Codes and Cryptology (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-030-36237-9_9
Communication theory (94A05) Cryptography (94A60) Channel models (including quantum) in information and communication theory (94A40) Authentication, digital signatures and secret sharing (94A62)
Cites Work
- Security Proofs for Signature Schemes
- Title not available (Why is that?)
- Advances in Cryptology – CRYPTO 2004
- Number-theoretic constructions of efficient pseudo-random functions
- Title not available (Why is that?)
- How to Time-Stamp a Digital Document
- Title not available (Why is that?)
- Title not available (Why is that?)
- Security of Symmetric Encryption against Mass Surveillance
- Cliptography: Clipping the Power of Kleptographic Attacks
- The Dark Side of “Black-Box” Cryptography or: Should We Trust Capstone?
- Lattice Klepto -- turning post-quantum crypto against itself
- A Kilobit Hidden SNFS Discrete Logarithm Computation
- A Formal Treatment of Backdoored Pseudorandom Generators
- Title not available (Why is that?)
- Title not available (Why is that?)
- Managing your kleptographic subscription plan
- Controlled randomness -- a defense against backdoors in cryptographic devices
- Stochastic kleptography detection
Cited In (3)
Uses Software
This page was built for publication: Subliminal Hash Channels
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3294875)