Subliminal Channels in Cryptographic Systems
暂无分享,去创建一个
[1] Butler W. Lampson,et al. A note on the confinement problem , 1973, CACM.
[2] Gustavus J. Simmons,et al. Subliminal Communication is Easy Using the DSA , 1994, EUROCRYPT.
[3] Amos Fiat,et al. Zero-knowledge proofs of identity , 1987, Journal of Cryptology.
[4] Taher El Gamal. A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, IEEE Trans. Inf. Theory.
[5] Gustavus J. Simmons,et al. A Secure Subliminal Channel (?) , 1985, CRYPTO.
[6] Jacques Stern,et al. Flaws in Applying Proof Methodologies to Signature Schemes , 2002, CRYPTO.
[7] Amos Fiat,et al. How to Prove Yourself: Practical Solutions to Identification and Signature Problems , 1986, CRYPTO.
[8] Yvo Desmedt,et al. Simmons' protocol is not free of subliminal channels , 1996, Proceedings 9th IEEE Computer Security Foundations Workshop.
[9] Ernest F. Brickell,et al. An Attack on a Signature Scheme Proposed by Okamoto and Shiraishi , 1985, CRYPTO.
[10] B. Schneier. Key Length , 2004 .
[11] Serge Vaudenay,et al. The Newton Channel , 1996, Information Hiding.
[12] Fei Li,et al. Perfect Subliminal Channel in a Paring-Based Digital Signature , 2009, 2009 International Conference on Computational Intelligence and Security.
[13] Serge Vaudenay,et al. Minding your p's and q's , 1996, ASIACRYPT.
[14] Yvo Desmedt,et al. Abuses in Cryptography and How to Fight Them , 1988, CRYPTO.
[15] Holger Petersen,et al. Subliminal Channels in discrete logarithm based signature schemes and how to avoid them , 1994 .
[16] Kazukuni Kobara,et al. Self-synchronized message randomization methods for subliminal channels , 1997, ICICS.
[17] Chin-Chen Chang,et al. An Improvement of the Design of Integrating Subliminal Channel with Access Control , 2006, IMECS.
[18] Simmons,et al. The Subliminal Channel and Digital Signatures , 2022 .
[19] Gustavus J. Simmons,et al. The Prisoners' Problem and the Subliminal Channel , 1983, CRYPTO.
[20] Yongge Wang. Abuses of probabilistic encryption schemes , 1998 .