scientific article; zbMATH DE number 1088240
From MaRDI portal
Publication:4364557
zbMath0886.94009MaRDI QIDQ4364557
Adam L. Young, Mordechai M. Yung
Publication date: 17 November 1997
Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Related Items
Practical algorithm substitution attack on extractable signatures, UC-secure cryptographic reverse firewall-guarding corrupted systems with the minimum trusted module, Non-interactive provably secure attestations for arbitrary RSA prime generation algorithms, Anamorphic encryption: private communication against a dictator, Steganography-free zero-knowledge, Subvert KEM to break DEM: practical algorithm-substitution attacks on public-key encryption, Subliminal Hash Channels, Monkey: Black-Box Symmetric Ciphers Designed for MONopolizing KEYs, Cryptography as an Attack Technology: Proving the RSA/Factoring Kleptographic Attack, Security of Auditing Protocols Against Subversion Attacks