咨询与建议

限定检索结果

文献类型

  • 6 篇 期刊文献
  • 4 篇 会议

馆藏范围

  • 10 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 10 篇 工学
    • 9 篇 计算机科学与技术...
    • 3 篇 电气工程
    • 3 篇 软件工程
    • 2 篇 信息与通信工程
    • 1 篇 网络空间安全
  • 3 篇 理学
    • 3 篇 数学
  • 1 篇 军事学
    • 1 篇 军队指挥学

主题

  • 10 篇 algorithm substi...
  • 2 篇 symmetric encryp...
  • 2 篇 mass surveillanc...
  • 2 篇 cryptographic re...
  • 1 篇 2-party ecdsa
  • 1 篇 detectability
  • 1 篇 discrete log
  • 1 篇 subversion resis...
  • 1 篇 public-key crypt...
  • 1 篇 lattice
  • 1 篇 ring-sis(small i...
  • 1 篇 sigma protocols
  • 1 篇 extractable sign...
  • 1 篇 identity-based e...
  • 1 篇 resistance
  • 1 篇 sm9 algorithm
  • 1 篇 keyword search
  • 1 篇 randomized algor...
  • 1 篇 cryptographic pr...
  • 1 篇 decryptability

机构

  • 2 篇 changan univ sch...
  • 2 篇 natl univ def te...
  • 1 篇 univ greenwich s...
  • 1 篇 taiyuan univ sci...
  • 1 篇 shaanxi normal u...
  • 1 篇 jinan univ peopl...
  • 1 篇 research&develop...
  • 1 篇 xian univ posts ...
  • 1 篇 school of cyber ...
  • 1 篇 tianjin univ col...
  • 1 篇 delft univ techn...
  • 1 篇 ruhr univ bochum...
  • 1 篇 univ lubeck lube...
  • 1 篇 fujian normal un...
  • 1 篇 chinese acad sci...
  • 1 篇 school of comput...
  • 1 篇 queens univ belf...
  • 1 篇 univ london roya...
  • 1 篇 school of cyber ...
  • 1 篇 henan key lab ne...

作者

  • 2 篇 chen rongmao
  • 2 篇 wang yi
  • 2 篇 zhao yi
  • 2 篇 ming yang
  • 1 篇 cheng jialiu
  • 1 篇 wu fusheng
  • 1 篇 liu hang
  • 1 篇 yu yong
  • 1 篇 yang bo
  • 1 篇 han jiang
  • 1 篇 liang kaitai
  • 1 篇 lin yuliang
  • 1 篇 liu jinhui
  • 1 篇 panaousis emmano...
  • 1 篇 cheng yuehua
  • 1 篇 degabriele jean ...
  • 1 篇 huang xinyi
  • 1 篇 liskiewicz macie...
  • 1 篇 liu chunxia
  • 1 篇 zhang huanguo

语言

  • 10 篇 英文
检索条件"主题词=Algorithm substitution attack"
10 条 记 录,以下是1-10 订阅
排序:
Practical algorithm substitution attack on extractable signatures
收藏 引用
DESIGNS CODES AND CRYPTOGRAPHY 2022年 第4期90卷 921-937页
作者: Zhao, Yi Liang, Kaitai Zhao, Yanqi Yang, Bo Ming, Yang Panaousis, Emmanouil Changan Univ Sch Informat Engn Xian 710064 Peoples R China Delft Univ Technol Fac Elect Engn Math & Comp Sci Delft Netherlands Xian Univ Posts & Telecommun Sch Cyberspace Secur Xian 710121 Peoples R China Shaanxi Normal Univ Sch Comp Sci Xian 710062 Peoples R China Univ Greenwich Sch Comp & Math Sci London England
An algorithm substitution attack (ASA) can undermine the security of cryptographic primitives by subverting the original implementation. An ASA succeeds when it extracts secrets without being detected. To launch an AS... 详细信息
来源: 评论
An algorithm substitution attack on Fiat-Shamir Signatures Based on Lattice
收藏 引用
Wuhan University Journal of Natural Sciences 2022年 第1期27卷 17-25页
作者: LIU Jinhui YU Yong WU Fusheng CHENG Yuehua ZHANG Huanguo School of Cyber Security Northwestern Polytechnical UniversityXi’an 710072ShaanxiChina Research&Development Institute of Northwestern Polytechnical University Shenzhen 518057GuangdongChina School of Cyber Security Xi’an University of Posts and TelecommunicationsXi’an 710121ShaanxiChina School of Computer Science Guizhou University of Finance and EconomicsGuiyang 550025GuizhouChina School of Computer Science Wuhan UniversityWuhan 430072HubeiChina
Many evidences have showed that some intelligence agencies(often called big brother)attempt to monitor citizens’communication by providing coerced citizens a lot of subverted cryptographic algorithms and coercing the... 详细信息
来源: 评论
algorithm substitution attacks from a Steganographic Perspective  17
Algorithm Substitution Attacks from a Steganographic Perspec...
收藏 引用
24th ACM-SIGSAC Conference on Computer and Communications Security (ACM CCS)
作者: Berndt, Sebastian Liskiewicz, Maciej Univ Lubeck Lubeck Germany
The goal of an algorithm substitution attack (ASA), also called a subversion attack (SA), is to replace an honest implementation of a cryptographic tool by a subverted one which allows to leak private information whil... 详细信息
来源: 评论
Practical algorithm substitution attacks on Real-World Public-Key Cryptosystems
收藏 引用
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY 2023年 18卷 5069-5081页
作者: Jiang, Haodong Han, Jiang Zhang, Zhenfeng Ma, Zhi Wang, Hong Henan Key Lab Network Cryptog Technol Zhengzhou 450001 Henan Peoples R China Chinese Acad Sci Inst Software Beijing 100190 Peoples R China
The revelations about massive surveillance have created significant interest in algorithm substitution attack (ASA), where an honest implementation of a cryptographic primitive is replaced by a subverted one which can... 详细信息
来源: 评论
algorithm substitution-Resistant SM9-Based Searchable Encryption With Cryptographic Reverse Firewall for Cloud Storage
收藏 引用
CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE 2025年 第9-11期37卷
作者: Gao, Gaimei Duan, Mingbo Xun, Yaling Liu, Chunxia Dang, Weichao Taiyuan Univ Sci & Technol Dept Comp Sci & Technol Taiyuan Peoples R China
To protect data privacy in cloud storage, sensitive data is commonly encrypted before being uploaded to a cloud storage server (CSS). This process challenges secure and efficient ciphertext retrieval. Identity-based e... 详细信息
来源: 评论
substitution attacks Against Sigma Protocols  14th
Substitution Attacks Against Sigma Protocols
收藏 引用
14th International Symposium on Cyberspace Safety and Security (CSS)
作者: Lin, Yuliang Chen, Rongmao Wang, Yi Wang, Baosheng Liu, Lin Natl Univ Def Technol Sch Comp Changsha Peoples R China
Inspired by the Snowden revelations, Bellare, Paterson, and Rogaway proposed the notion of algorithm substitution attack (ASA) where the attacker could subvert cryptographic algorithms to leak secret information steal... 详细信息
来源: 评论
Generic Construction: Cryptographic Reverse Firewalls for Public Key Encryption With Keyword Search in Cloud Storage
收藏 引用
IEEE TRANSACTIONS ON CLOUD COMPUTING 2024年 第2期12卷 405-418页
作者: Ming, Yang Liu, Hang Wang, Chenhao Zhao, Yi Changan Univ Sch Informat Engn Xian 710064 Shaanxi Peoples R China
The Snowden incident illustrates that an adversary may launch an algorithm substitution attack (ASA) by tampering with the algorithms of protocol participants to obtain users' secret information. A measure against... 详细信息
来源: 评论
Subverting Cryptographic Protocols from a Fine-Grained Perspective- A Case Study on 2-Party ECDSA  29th
Subverting Cryptographic Protocols from a Fine-Grained Persp...
收藏 引用
29th Australasian Conference on Information Security and Privacy (ACISP)
作者: Cheng, Jialiu Wang, Yi Chen, Rongmao Huang, Xinyi Natl Univ Def Technol Sch Comp Changsha Peoples R China Jinan Univ Guangzhou Peoples R China
The revelations of Edward Snowden in 2013 rekindled concerns within the cryptographic community regarding the potential subversion of cryptographic systems. Bellare et al. (CRYPTO'14) introduced the notion of Algo... 详细信息
来源: 评论
A More Cautious Approach to Security Against Mass Surveillance  22nd
A More Cautious Approach to Security Against Mass Surveillan...
收藏 引用
22nd International Workshop on Fast Software Encryption (FSE)
作者: Degabriele, Jean Paul Farshim, Pooya Poettering, Bertram Univ London Royal Holloway London England Queens Univ Belfast Belfast Antrim North Ireland Ruhr Univ Bochum Bochum Germany
At CRYPTO 2014 Bellare, Paterson, and Rogaway (BPR) presented a formal treatment of symmetric encryption in the light of algorithm substitution attacks (ASAs), which may be employed by 'big brother' entities f... 详细信息
来源: 评论
On the Security of Symmetric Encryption Against Mass Surveillance
收藏 引用
IEEE ACCESS 2020年 8卷 175625-175636页
作者: Sun, Da-Zhi Mu, Yi Tianjin Univ Coll Intelligence & Comp Tianjin Key Lab Adv Networking TANK Tianjin 300350 Peoples R China Fujian Normal Univ Coll Math & Informat Fujian Prov Key Lab Network Secur & Cryptol Fuzhou 350007 Peoples R China
For mass surveillance, the algorithm substitution attacks (ASAs) are serious security threats to the symmetric encryption schemes. At CRYPTO 2014, Bellare, Paterson, and Rogaway (BPR) formally developed the security n... 详细信息
来源: 评论