Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
Cryptographic Reverse Firewalls - MaRDI portal

Cryptographic Reverse Firewalls

From MaRDI portal
Publication:2948399

DOI10.1007/978-3-662-46803-6_22zbMath1375.94152OpenAlexW2219924285MaRDI QIDQ2948399

Ilya Mironov, Noah Stephens-Davidowitz

Publication date: 30 September 2015

Published in: Advances in Cryptology - EUROCRYPT 2015 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-662-46803-6_22




Related Items (23)

Practical algorithm substitution attack on extractable signaturesReceiver-anonymity in rerandomizable RCCA-secure cryptosystems resolvedAccess Control Encryption: Enforcing Information Flow with CryptographyUC-secure cryptographic reverse firewall-guarding corrupted systems with the minimum trusted moduleSubversion-resilient enhanced privacy IDUniversally composable subversion-resilient cryptographyCliptography: Clipping the Power of Kleptographic AttacksCryptographic Reverse Firewall via Malleable Smooth Projective Hash FunctionsOn access control encryption without sanitizationReverse firewalls for oblivious transfer extension and applications to zero-knowledgeReverse firewalls for adaptively secure MPC without setupIdentity-based encryption for fair anonymity applications: defining, implementing, and applying rerandomizable RCCA-secure IBESteganography-free zero-knowledgePublic-key generation with verifiable randomnessSubvert KEM to break DEM: practical algorithm-substitution attacks on public-key encryptionCryptographic reverse firewalls for interactive proof systemsImmunization against complete subversion without random oraclesSubversion-resilient signatures: definitions, constructions and applicationsSubversion-resilient public key encryption with practical watchdogsMessage Transmission with Reverse Firewalls—Secure Communication on Corrupted MachinesBackdoors in Pseudorandom Number Generators: Possibility and Impossibility ResultsReverse firewalls for actively secure MPCsSecurity of Auditing Protocols Against Subversion Attacks






This page was built for publication: Cryptographic Reverse Firewalls