Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
Cliptography: Clipping the Power of Kleptographic Attacks - MaRDI portal

Cliptography: Clipping the Power of Kleptographic Attacks

From MaRDI portal
Publication:2953772

DOI10.1007/978-3-662-53890-6_2zbMath1380.94121OpenAlexW2406153758MaRDI QIDQ2953772

Qiang Tang, Alexander Russell, Hong-Sheng Zhou, Mordechai M. Yung

Publication date: 6 January 2017

Published in: Advances in Cryptology – ASIACRYPT 2016 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-662-53890-6_2




Related Items (22)

UC-secure cryptographic reverse firewall-guarding corrupted systems with the minimum trusted moduleSubversion-resilient enhanced privacy IDHomomorphic lower digits removal and improved FHE bootstrappingNon-interactive provably secure attestations for arbitrary RSA prime generation algorithmsAnamorphic encryption: private communication against a dictatorVerifiably-Extractable OWFs and Their Applications to Subversion Zero-KnowledgeCliptography: Clipping the Power of Kleptographic AttacksNIZKs with an Untrusted CRS: Security in the Face of Parameter SubversionCryptographic Reverse Firewall via Malleable Smooth Projective Hash FunctionsAnamorphic signatures: secrecy from a dictator who only permits authentication!Reverse firewalls for adaptively secure MPC without setupCrooked indifferentiability of enveloped XOR revisitedSteganography-free zero-knowledgeBackdoor-resistant identity-based proxy re-encryption for cloud-assisted wireless body area networksSubvert KEM to break DEM: practical algorithm-substitution attacks on public-key encryptionCryptographic reverse firewalls for interactive proof systemsSubliminal Hash ChannelsImmunization against complete subversion without random oraclesSubversion-resilient signatures: definitions, constructions and applicationsSubversion-resilient public key encryption with practical watchdogsMessage Transmission with Reverse Firewalls—Secure Communication on Corrupted MachinesBackdoors in Pseudorandom Number Generators: Possibility and Impossibility Results




Cites Work




This page was built for publication: Cliptography: Clipping the Power of Kleptographic Attacks