Subliminal Hash Channels
From MaRDI portal
Publication:3294875
DOI10.1007/978-3-030-36237-9_9zbMath1457.94083OpenAlexW2982500592MaRDI QIDQ3294875
Publication date: 29 June 2020
Published in: Algebra, Codes and Cryptology (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-030-36237-9_9
Cryptography (94A60) Channel models (including quantum) in information and communication theory (94A40) Authentication, digital signatures and secret sharing (94A62) Communication theory (94A05)
Uses Software
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Lattice Klepto -- turning post-quantum crypto against itself
- Managing your kleptographic subscription plan
- Controlled randomness -- a defense against backdoors in cryptographic devices
- Security of Symmetric Encryption against Mass Surveillance
- Security Proofs for Signature Schemes
- A Formal Treatment of Backdoored Pseudorandom Generators
- Cliptography: Clipping the Power of Kleptographic Attacks
- Number-theoretic constructions of efficient pseudo-random functions
- The Dark Side of “Black-Box” Cryptography or: Should We Trust Capstone?
- How to Time-Stamp a Digital Document
- Advances in Cryptology – CRYPTO 2004
- A Kilobit Hidden SNFS Discrete Logarithm Computation
This page was built for publication: Subliminal Hash Channels