The Dark Side of “Black-Box” Cryptography or: Should We Trust Capstone?

From MaRDI portal
Publication:3452343

DOI10.1007/3-540-68697-5_8zbMath1329.94082OpenAlexW1499713421WikidataQ56813135 ScholiaQ56813135MaRDI QIDQ3452343

Adam L. Young, Mordechai M. Yung

Publication date: 11 November 2015

Published in: Advances in Cryptology — CRYPTO ’96 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/3-540-68697-5_8




Related Items (30)

Practical algorithm substitution attack on extractable signaturesUC-secure cryptographic reverse firewall-guarding corrupted systems with the minimum trusted moduleSubversion-resilient enhanced privacy IDHomomorphic lower digits removal and improved FHE bootstrappingKleptographic (algorithmic) backdoors in the RSA key generatorNon-interactive provably secure attestations for arbitrary RSA prime generation algorithmsUniversally composable subversion-resilient cryptographyAnamorphic encryption: private communication against a dictatorOn the impossibility of cryptography with tamperable randomnessCliptography: Clipping the Power of Kleptographic AttacksNIZKs with an Untrusted CRS: Security in the Face of Parameter SubversionImplications of the arithmetic ratio of prime numbers for RSA securityHow to backdoor (classic) McEliece and how to guard against backdoorsCryptographic Reverse Firewall via Malleable Smooth Projective Hash FunctionsAnamorphic signatures: secrecy from a dictator who only permits authentication!Reverse firewalls for adaptively secure MPC without setupCrooked indifferentiability of enveloped XOR revisitedSubvert KEM to break DEM: practical algorithm-substitution attacks on public-key encryptionOn the universal steganography of optimal rateSubliminal Hash ChannelsImmunization against complete subversion without random oraclesMonkey: Black-Box Symmetric Ciphers Designed for MONopolizing KEYsSubversion-resilient signatures: definitions, constructions and applicationsA Kilobit Hidden SNFS Discrete Logarithm ComputationUnnamed ItemCryptography as an Attack Technology: Proving the RSA/Factoring Kleptographic AttackRSA Moduli with a Predetermined Portion: Techniques and ApplicationsSubversion-resilient public key encryption with practical watchdogsSecurity of Auditing Protocols Against Subversion AttacksThe MALICIOUS framework: embedding backdoors into tweakable block ciphers


Uses Software


Cites Work


This page was built for publication: The Dark Side of “Black-Box” Cryptography or: Should We Trust Capstone?