Google
Abstract. We put forward the notion of self-guarding cryptographic protocols as a countermeasure to algorithm substitution attacks. Such self-guarding�...
Abstract: We put forward the notion of self-guarding cryptographic protocols as a countermeasure to algorithm substitution attacks. Such self-guarding�...
We put forward the notion of self-guarding cryptographic protocols as a countermeasure to algorithm substitution attacks. Such self-guarding protocols can�...
The goal of an algorithm substitution attack against ΠA,B is to manipulate one of the parties such that the run of the protocol leaks this se- cret to an�...
May 30, 2022Kleptography or algorithm substitution attacks (ASA) describe techniques to place backdoors right into cryptographic primitives.
Self-Guarding Cryptographic Protocols against Algorithm Substitution Attacks � M. FischlinSogol Mazaheri. Computer Science. 2018 IEEE 31st Computer Security�...
People also ask
Jun 25, 2014Yes, we need to take these issues seriously. In fairness, cryptographers have long been aware of such issues, and many protocols and ciphers�...
Missing: Guarding | Show results with:Guarding
Jun 21, 2022This work describes a class of Algorithm Substitution Attack (ASA) generically targeting the receiver of a communication between two parties.
Abstract. This work describes a class of Algorithm Substitution Attack (ASA) generically targeting the receiver of a communication between two parties.
Jun 21, 2022This work describes a class of Algorithm Substitution Attack (ASA) generically targeting the receiver of a communication between two parties�...