How to Encrypt with a Malicious Random Number Generator
From MaRDI portal
Publication:3525681
DOI10.1007/978-3-540-71039-4_19zbMath1154.68397OpenAlexW1598210976MaRDI QIDQ3525681
Publication date: 18 September 2008
Published in: Fast Software Encryption (Search for Journal in Brave)
Full work available at URL: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.542.4764
Cryptography (94A60) Data encryption (aspects in computer science) (68P25) Authentication, digital signatures and secret sharing (94A62)
Related Items (5)
Strengthening the security of authenticated key exchange against bad randomness ⋮ On the impossibility of cryptography with tamperable randomness ⋮ Selective-Opening Security in the Presence of Randomness Failures ⋮ Secrecy Without Perfect Randomness: Cryptography with (Bounded) Weak Sources ⋮ Randomness Leakage in the KEM/DEM Framework
This page was built for publication: How to Encrypt with a Malicious Random Number Generator