Security of Symmetric Encryption against Mass Surveillance
From MaRDI portal
Publication:2874493
DOI10.1007/978-3-662-44371-2_1zbMath1317.94084OpenAlexW180983570MaRDI QIDQ2874493
Mihir Bellare, Kenneth G. Paterson, Phillip Rogaway
Publication date: 7 August 2014
Published in: Advances in Cryptology – CRYPTO 2014 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-662-44371-2_1
Related Items (32)
Practical algorithm substitution attack on extractable signatures ⋮ Stand-by Attacks on E-ID Password Authentication ⋮ UC-secure cryptographic reverse firewall-guarding corrupted systems with the minimum trusted module ⋮ Subversion-resilient enhanced privacy ID ⋮ On the gold standard for security of universal steganography ⋮ Universally composable subversion-resilient cryptography ⋮ Anamorphic encryption: private communication against a dictator ⋮ On the impossibility of cryptography with tamperable randomness ⋮ Cliptography: Clipping the Power of Kleptographic Attacks ⋮ NIZKs with an Untrusted CRS: Security in the Face of Parameter Subversion ⋮ Multi-instance secure public-key encryption ⋮ Sequential digital signatures for cryptographic software-update authentication ⋮ How to backdoor (classic) McEliece and how to guard against backdoors ⋮ Cryptographic Reverse Firewall via Malleable Smooth Projective Hash Functions ⋮ Reverse firewalls for adaptively secure MPC without setup ⋮ Crooked indifferentiability of enveloped XOR revisited ⋮ Steganography-free zero-knowledge ⋮ Backdoor-resistant identity-based proxy re-encryption for cloud-assisted wireless body area networks ⋮ Subvert KEM to break DEM: practical algorithm-substitution attacks on public-key encryption ⋮ On the universal steganography of optimal rate ⋮ Cryptographic reverse firewalls for interactive proof systems ⋮ Subliminal Hash Channels ⋮ Immunization against complete subversion without random oracles ⋮ Verifiable Side-Channel Security of Cryptographic Implementations: Constant-Time MEE-CBC ⋮ Subversion-resilient signatures: definitions, constructions and applications ⋮ Unnamed Item ⋮ Assisted Identification of Mode of Operation in Binary Code with Dynamic Data Flow Slicing ⋮ Subversion-resilient public key encryption with practical watchdogs ⋮ Message Transmission with Reverse Firewalls—Secure Communication on Corrupted Machines ⋮ Big-Key Symmetric Encryption: Resisting Key Exfiltration ⋮ Backdoors in Pseudorandom Number Generators: Possibility and Impossibility Results ⋮ Security of Auditing Protocols Against Subversion Attacks
This page was built for publication: Security of Symmetric Encryption against Mass Surveillance