Subliminal Channels in Cryptographic Systems

[1]  Butler W. Lampson,et al.  A note on the confinement problem , 1973, CACM.

[2]  Gustavus J. Simmons,et al.  Subliminal Communication is Easy Using the DSA , 1994, EUROCRYPT.

[3]  Amos Fiat,et al.  Zero-knowledge proofs of identity , 1987, Journal of Cryptology.

[4]  Taher El Gamal A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, IEEE Trans. Inf. Theory.

[5]  Gustavus J. Simmons,et al.  A Secure Subliminal Channel (?) , 1985, CRYPTO.

[6]  Jacques Stern,et al.  Flaws in Applying Proof Methodologies to Signature Schemes , 2002, CRYPTO.

[7]  Amos Fiat,et al.  How to Prove Yourself: Practical Solutions to Identification and Signature Problems , 1986, CRYPTO.

[8]  Yvo Desmedt,et al.  Simmons' protocol is not free of subliminal channels , 1996, Proceedings 9th IEEE Computer Security Foundations Workshop.

[9]  Ernest F. Brickell,et al.  An Attack on a Signature Scheme Proposed by Okamoto and Shiraishi , 1985, CRYPTO.

[10]  B. Schneier Key Length , 2004 .

[11]  Serge Vaudenay,et al.  The Newton Channel , 1996, Information Hiding.

[12]  Fei Li,et al.  Perfect Subliminal Channel in a Paring-Based Digital Signature , 2009, 2009 International Conference on Computational Intelligence and Security.

[13]  Serge Vaudenay,et al.  Minding your p's and q's , 1996, ASIACRYPT.

[14]  Yvo Desmedt,et al.  Abuses in Cryptography and How to Fight Them , 1988, CRYPTO.

[15]  Holger Petersen,et al.  Subliminal Channels in discrete logarithm based signature schemes and how to avoid them , 1994 .

[16]  Kazukuni Kobara,et al.  Self-synchronized message randomization methods for subliminal channels , 1997, ICICS.

[17]  Chin-Chen Chang,et al.  An Improvement of the Design of Integrating Subliminal Channel with Access Control , 2006, IMECS.

[18]  Simmons,et al.  The Subliminal Channel and Digital Signatures , 2022 .

[19]  Gustavus J. Simmons,et al.  The Prisoners' Problem and the Subliminal Channel , 1983, CRYPTO.

[20]  Yongge Wang Abuses of probabilistic encryption schemes , 1998 .