Security of Symmetric Encryption against Mass Surveillance

From MaRDI portal
Publication:2874493

DOI10.1007/978-3-662-44371-2_1zbMath1317.94084OpenAlexW180983570MaRDI QIDQ2874493

Mihir Bellare, Kenneth G. Paterson, Phillip Rogaway

Publication date: 7 August 2014

Published in: Advances in Cryptology – CRYPTO 2014 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-662-44371-2_1




Related Items (32)

Practical algorithm substitution attack on extractable signaturesStand-by Attacks on E-ID Password AuthenticationUC-secure cryptographic reverse firewall-guarding corrupted systems with the minimum trusted moduleSubversion-resilient enhanced privacy IDOn the gold standard for security of universal steganographyUniversally composable subversion-resilient cryptographyAnamorphic encryption: private communication against a dictatorOn the impossibility of cryptography with tamperable randomnessCliptography: Clipping the Power of Kleptographic AttacksNIZKs with an Untrusted CRS: Security in the Face of Parameter SubversionMulti-instance secure public-key encryptionSequential digital signatures for cryptographic software-update authenticationHow to backdoor (classic) McEliece and how to guard against backdoorsCryptographic Reverse Firewall via Malleable Smooth Projective Hash FunctionsReverse firewalls for adaptively secure MPC without setupCrooked indifferentiability of enveloped XOR revisitedSteganography-free zero-knowledgeBackdoor-resistant identity-based proxy re-encryption for cloud-assisted wireless body area networksSubvert KEM to break DEM: practical algorithm-substitution attacks on public-key encryptionOn the universal steganography of optimal rateCryptographic reverse firewalls for interactive proof systemsSubliminal Hash ChannelsImmunization against complete subversion without random oraclesVerifiable Side-Channel Security of Cryptographic Implementations: Constant-Time MEE-CBCSubversion-resilient signatures: definitions, constructions and applicationsUnnamed ItemAssisted Identification of Mode of Operation in Binary Code with Dynamic Data Flow SlicingSubversion-resilient public key encryption with practical watchdogsMessage Transmission with Reverse Firewalls—Secure Communication on Corrupted MachinesBig-Key Symmetric Encryption: Resisting Key ExfiltrationBackdoors in Pseudorandom Number Generators: Possibility and Impossibility ResultsSecurity of Auditing Protocols Against Subversion Attacks







This page was built for publication: Security of Symmetric Encryption against Mass Surveillance