Kleptography from Standard Assumptions and Applications
From MaRDI portal
Publication:3588346
DOI10.1007/978-3-642-15317-4_18zbMath1291.94172OpenAlexW1575827919MaRDI QIDQ3588346
Adam L. Young, Mordechai M. Yung
Publication date: 10 September 2010
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-15317-4_18
Related Items (4)
Elligator Squared: Uniform Points on Elliptic Curves of Prime Order as Uniform Random Strings ⋮ Cliptography: Clipping the Power of Kleptographic Attacks ⋮ How to backdoor (classic) McEliece and how to guard against backdoors ⋮ Lattice Klepto -- turning post-quantum crypto against itself
This page was built for publication: Kleptography from Standard Assumptions and Applications