Backdoors in Pseudorandom Number Generators: Possibility and Impossibility Results
暂无分享,去创建一个
Kenneth G. Paterson | Jacob C. N. Schuldt | Jean Paul Degabriele | Joanne Woodage | K. Paterson | Joanne Woodage
[1] Mihir Bellare,et al. Deterministic and Efficiently Searchable Encryption , 2007, CRYPTO.
[2] Rafail Ostrovsky,et al. Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data , 2004, SIAM J. Comput..
[3] Kenneth G. Paterson,et al. Security of Symmetric Encryption against Mass Surveillance , 2014, IACR Cryptol. ePrint Arch..
[4] Moti Yung,et al. Kleptography: Using Cryptography Against Cryptography , 1997, EUROCRYPT.
[5] Adam O'Neill,et al. Instantiability of RSA-OAEP Under Chosen-Plaintext Attack , 2010, Journal of Cryptology.
[6] Adi Shamir,et al. How to Eat Your Entropy and Have it Too: Optimal Recovery Strategies for Compromised RNGs , 2017, Algorithmica.
[7] Moti Yung,et al. Cliptography: Clipping the Power of Kleptographic Attacks , 2016, ASIACRYPT.
[8] Tanja Lange,et al. On the Practical Exploitability of Dual EC in TLS Implementations , 2014, USENIX Security Symposium.
[9] Daniel J. Bernstein,et al. Elligator: elliptic-curve points indistinguishable from uniform random strings , 2013, IACR Cryptol. ePrint Arch..
[10] Tanja Lange,et al. Factoring RSA keys from certified smart cards: Coppersmith in the wild , 2013, IACR Cryptol. ePrint Arch..
[11] Giuseppe Ateniese,et al. Subversion-Resilient Signature Schemes , 2015, IACR Cryptol. ePrint Arch..
[12] Vijay V. Vazirani,et al. Trapdoor pseudo-random number generators, with applications to protocol design , 1983, 24th Annual Symposium on Foundations of Computer Science (sfcs 1983).
[13] David Pointcheval,et al. Security analysis of pseudo-random number generators with input: /dev/random is not robust , 2013, CCS.
[14] Eric Wustrow,et al. Mining Your Ps and Qs: Detection of Widespread Weak Keys in Network Devices , 2012, USENIX Security Symposium.
[15] Thomas Ristenpart,et al. When Good Randomness Goes Bad: Virtual Machine Reset Vulnerabilities and Hedging Deployed Cryptography , 2010, NDSS.
[16] Brent Waters,et al. Lossy Trapdoor Functions and Their Applications , 2011, SIAM J. Comput..
[17] Rafail Ostrovsky,et al. Lossy Encryption: Constructions from General Assumptions and Efficient Selective Opening Chosen Ciphertext Security , 2011, ASIACRYPT.
[18] Daniel J. Bernstein,et al. How to manipulate curve standards: a white paper for the black hat , 2014, IACR Cryptol. ePrint Arch..
[19] Gustavus J. Simmons,et al. The Prisoners' Problem and the Subliminal Channel , 1983, CRYPTO.
[20] Shai Halevi,et al. A model and architecture for pseudo-random generation with applications to /dev/random , 2005, CCS '05.
[21] Amit Sahai,et al. On the (im)possibility of cryptography with imperfect randomness , 2004, 45th Annual IEEE Symposium on Foundations of Computer Science.
[22] Mario Cornejo,et al. Characterization of Real-Life PRNGs under Partial State Corruption , 2014, CCS.
[23] Pooya Farshim,et al. A More Cautious Approach to Security Against Mass Surveillance , 2015, FSE.
[24] Daniel R. L. Brown. A Weak-Randomizer Attack on RSA-OAEP with e = 3 , 2005, IACR Cryptol. ePrint Arch..
[25] Moti Yung,et al. Relationships Between Diffie-Hellman and "Index Oracles" , 2004, SCN.
[26] Hovav Shacham,et al. When private keys are public: results from the 2008 Debian OpenSSL vulnerability , 2009, IMC '09.
[27] Ian Goldberg,et al. Randomness and the Netscape browser , 1996 .
[28] Yevgeniy Dodis,et al. A Formal Treatment of Backdoored Pseudorandom Generators , 2015, EUROCRYPT.
[29] Ilya Mironov,et al. Cryptographic Reverse Firewalls , 2015, EUROCRYPT.
[30] Arjen K. Lenstra,et al. Public Keys , 2012, CRYPTO.
[31] Tancrède Lepoint,et al. Trap Me If You Can - Million Dollar Curve , 2015, IACR Cryptol. ePrint Arch..
[32] Bodo Möller,et al. A Public-Key Encryption Scheme with Pseudo-random Ciphertexts , 2004, ESORICS.