메뉴 건너뛰기




Volumn 3376, Issue , 2005, Pages 7-18

Malicious cryptography: Kleptographic aspects

Author keywords

Attacks; Kleptography; Malicious cryptography; Public key cryptography; Rabin; Random oracle; RSA; Security threats; SETUP

Indexed keywords

CODES (SYMBOLS); COMPUTATION THEORY; COMPUTER SOFTWARE;

EID: 24144478261     PISSN: 03029743     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1007/978-3-540-30574-3_2     Document Type: Conference Paper
Times cited : (27)

References (9)
  • 2
    • 84947730183 scopus 로고    scopus 로고
    • Generating RSA moduli with a predetermined portion
    • A. K. Lenstra. Generating RSA Moduli with a Predetermined Portion. In Advances in Cryptology - Asiacrypt '98, pages 1-10, 1998.
    • (1998) Advances in Cryptology - Asiacrypt '98 , pp. 1-10
    • Lenstra, A.K.1
  • 3
    • 35048881103 scopus 로고    scopus 로고
    • Can we trust cryptographic software? Cryptographic flaws in GNU privacy guard v1.2.3
    • P. Q. Nguyen. Can We Trust Cryptographic Software? Cryptographic Flaws in GNU Privacy Guard v1.2.3. In Advances in Cryptology - Eurocrypt '04, pages 555-570, 2004.
    • (2004) Advances in Cryptology - Eurocrypt '04 , pp. 555-570
    • Nguyen, P.Q.1
  • 5
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public-key cryptosystems
    • R. Rivest, A. Shamir, L. Adleman. A method for obtaining Digital Signatures and Public-Key Cryptosystems. In Communications of the ACM, volume 21, n. 2, pages 120-126, 1978.
    • (1978) Communications of the ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.1    Shamir, A.2    Adleman, L.3
  • 7
    • 84955586344 scopus 로고    scopus 로고
    • The dark side of black-box cryptography, or: Should we trust capstone?
    • A. Young, M. Yung. The Dark Side of Black-Box Cryptography, or: Should we trust Capstone? In Advances in Cryptology - Crypto '96, pages 89-103, 1996.
    • (1996) Advances in Cryptology - Crypto '96 , pp. 89-103
    • Young, A.1    Yung, M.2
  • 8


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.