The Dark Side of "Black-Box" Cryptography or: Should We Trust Capstone? (1996)

Cached

Download Links

by Adam Young , Moti Yung
Venue:in Advances in Cryptology - Crypto '96
Citations:21 - 4 self

Active Bibliography

1 Towards signature-only signature schemes – Adam Young, Moti Yung - 2000
18 Cryptovirology: Extortion-Based Security Threats and Countermeasures – Adam Young, Moti Yung - 1996
1 The\Omega Key Management Service – Michael K. Reiter, Matthew K. Franklin, John B. Lacy, Rebecca N. Wright - 1996
5 The Capacity of a Channel with a One-Way Function – Kazukuni Kobara, Hideki Imai - 1997
5 Simmons' Protocol is Not Free of Subliminal Channels – Yvo Desmedt - 1996
1 On the Channel Capacity of Narrow-band Subliminal Channels – Kazukuni Kobara, Hideki Imai - 1999
1 A Successive Carrier-transmission Model for Narrow-band Subliminal Channels – Kazukuni Kobara, Hideki Imai - 1998
Cryptology (ICISC'98), pp.179{187,(1998) A Successive Carrier-transmission Model for Narrow-band Subliminal Channels? – Kazukuni Kobara, Hideki Imai
Chapter 1—Foundations 1.1 Terminology – Bruce Schneier, Wiley Computer Publishing, John Wiley, Whitfield Diffie
unknown title – Foreword Whitfield Diffie
Mathematical Foundations of Modern Cryptography: Computational Complexity Perspective – Shafi Goldwasser - 2002
1 Cryptology – Prof Ronald Rivest, L. Rivest
42 Synthesizers and Their Application to the Parallel Construction of Pseudo-Random Functions – Moni Naor , Omer Reingold - 1995
Codes -- The Guide to Secrecy . . . – Richard A. Mollin
116 Robustness Principles for Public Key Protocols – Ross Anderson, Roger Needham - 1995
2 Survey of Computational Assumptions Used in Cryptography Broken or Not by Shor's Algorithm – Hong Zhu - 2001
18 Efficient Electronic Cash: New Notions and Techniques – Yiannis S. Tsiounis - 1997
6 A Method for Examining Cryptographic Protocols – Brett C. Tjaden - 1997
1 ATM cell based security implementation – Ana Gamage, Jussipekka Leiwo, Yuliang Zheng - 1997