The Dark Side of "Black-Box" Cryptography or: Should We Trust Capstone? (1996)

Cached

Download Links

by Adam Young , Moti Yung
Venue:in Advances in Cryptology - Crypto '96
Citations:21 - 4 self

Documents Related by Co-Citation

24 Kleptography: Using cryptography against cryptography – Adam L Young, Moti M Yung - 1997
2895 A Method for Obtaining Digital Signatures and Public-Key Cryptosystems – R.L. Rivest, A. Shamir, L. Adleman - 1978
118 Making mix nets robust for electronic voting by randomized partial checking – Markus Jakobsson, Ari Juels, Ronald L. Rivest - 2002
190 The prisoners’ problem and the subliminal channel – G J Simmons - 1983
18 The Subliminal Channel and Digital Signatures – G J Simmons - 1985
19 Subliminal communication is easy using the DSA – G J Simmons - 1994
42 An attack on RSA given a small fraction of the private key bits – D Boneh, G Durfee, Y Frankel - 1998
155 A verifiable secret shuffle and its application to E-Voting – C. Andrew Neff - 2001
142 Secret-ballot receipts: True voter-verifiable elections – D Chaum - 2004
2453 Handbook of Applied Cryptography – Alfred J. Menezes, Paul C. Van Oorschot, Scott A. Vanstone, R. L. Rivest - 1997
9 The prevalence of kleptographic attacks on discrete-log based cryptosystems – Adam L Young, Moti M Yung - 1997
15 Abuses in Cryptography and How to Fight Them – Yvo Desmedt - 1990
67 Finding a small root of a bivariate integer equation; factoring with high bits known – D Coppersmith - 1996
42 Special Uses and Abuses of the Fiat-Shamir Passport Protocol – Y Desmedt, C Goutier, S Bengio - 1988
22 Auto-recoverable autocertifiable cryptosystems – Adam L Young, Moti M Yung - 1998
22 Generating RSA Moduli with a Predetermined Portion – A K Lenstra - 1998
43 The Kerberos Network Authentication – C Neuman, T Yu, S Hartman, K Raeburn
2693 New Directions in Cryptography – Whitfield Diffie, Martin E. Hellman - 1976
1132 A logic of authentication – Michael Burrows, MartĂ­n Abadi, Roger Needham - 1990