搜索结果: 1-6 共查到“密码学 backdoors”相关记录6条 . 查询时间(0.047 秒)
On the Existence of Non-Linear Invariants and Algebraic Polynomial Constructive Approach to Backdoors in Block Ciphers
block ciphers Boolean functions Algebraic Normal Form
font style='font-size:12px;'>
2018/11/19
In this paper we study cryptanalysis with non-linear polynomials cf. Eurocrypt’95 (adapted to Feistel ciphers at Crypto 2004). Previously researchers had serious difficulties in making such attacks wo...
Cryptography with Dispensable Backdoors
quantum cryptography Dispensable Backdoors
font style='font-size:12px;'>
2018/4/20
Backdooring cryptographic algorithms is an indisputable taboo in the cryptographic literature for a good reason: however noble the intentions, backdoors might fall in the wrong hands, in which case se...
Indiscreet Logs: Persistent Diffie-Hellman Backdoors in TLS
discrete logarithm problem diffie-hellman small subgroup attack
font style='font-size:12px;'>
2016/12/8
Software implementations of discrete logarithm based cryptosystems over finite fields typically make the assumption that any domain parameters they are presented with are trustworthy, i.e., the parame...
Backdoors in Pseudorandom Number Generators: Possibility and Impossibility Results
Backdoor Surveillance PRNG with input
font style='font-size:12px;'>
2016/6/6
Inspired by the Dual EC DBRG incident, Dodis et al. (Eurocrypt
2015) initiated the formal study of backdoored PRGs, showing
that backdoored PRGs are equivalent to public key encryption schemes,
giv...
DEcryption Contract ENforcement Tool (DECENT): A Practical Alternative to Government Decryption Backdoors
Practical Alternative Government Decryption Backdoors
font style='font-size:12px;'>
2016/3/7
A cryptographic contract and enforcement technology would guarantee release of a data
decryption key to an authorized party if and only if predetermined contract
requirements are satisfied. Threshol...
Simple Backdoors for RSA Key Generation
Simple Backdoors RSA Key Generation
font style='font-size:12px;'>
2009/4/15
We present extremely simple ways of embedding a backdoor
in the key generation scheme of RSA. Three of our schemes generate
two genuinely random primes p and q of a given size, to obtain their
publ...