A Subliminal Channel in EdDSA: Information Leakage with High-Speed Signatures
暂无分享,去创建一个
[1] Carlos Scott,et al. Network Covert Channels : Review of Current State and Analysis of Viability of the use of X . 509 Certificates for Covert Communications , 2008 .
[2] Ning Li,et al. Reversible Watermarking with Subliminal Channel , 2008, Information Hiding.
[3] María Isabel González Vasco,et al. A Subliminal-Free Variant of ECDSA , 2006, Information Hiding.
[4] Guozhen Xiao,et al. A Subliminal-Free Variant of ECDSA Using Interactive Protocol , 2010, 2010 International Conference on E-Product E-Service and E-Entertainment.
[5] Rainer Steinwandt,et al. On Subliminal Channels in Deterministic Signature Schemes , 2004, ICISC.
[6] Eric Rescorla,et al. The Transport Layer Security (TLS) Protocol Version 1.3 , 2018, RFC.
[7] C. P. Schnorr,et al. Efficient Identification and Signatures for Smart Cards (Abstract) , 1989, EUROCRYPT.
[8] Joachim Fabini,et al. SecureTime: Secure Multicast Time Synchronization , 2017, ArXiv.
[9] Gustavus J. Simmons,et al. Subliminal Communication is Easy Using the DSA , 1994, EUROCRYPT.
[10] Simon Josefsson,et al. Edwards-Curve Digital Signature Algorithm (EdDSA) , 2017, RFC.
[11] Zbigniew Golebiewski,et al. Stealing Secrets with SSL/TLS and SSH - Kleptographic Attacks , 2006, CANS.
[12] Moti Yung,et al. Space-Efficient Kleptography Without Random Oracles , 2007, Information Hiding.
[13] Tim Dierks,et al. The Transport Layer Security (TLS) Protocol Version 1.2 , 2008 .
[14] Michael Hamburg,et al. Ed448-Goldilocks, a new elliptic curve , 2015, IACR Cryptol. ePrint Arch..
[15] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[16] Tanja Lange,et al. High-speed high-security signatures , 2011, Journal of Cryptographic Engineering.
[17] Simon Josefsson,et al. Elliptic Curve Cryptography (ECC) Cipher Suites for Transport Layer Security (TLS) Versions 1.2 and Earlier , 2018, RFC.
[18] Serge Vaudenay,et al. The Newton Channel , 1996, Information Hiding.
[19] Benny Pinkas,et al. The Design and Implementation of Protocol-Based Hidden Key Recovery , 2003, ISC.
[20] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[21] Justin Merrill. Covert Channels in SSL Session Negotiation Headers , 2015 .
[22] Daniel J. Bernstein,et al. Curve25519: New Diffie-Hellman Speed Records , 2006, Public Key Cryptography.
[23] Robert Edmonds,et al. Edwards-Curve Digital Security Algorithm (EdDSA) for DNSSEC , 2017, RFC.
[24] Xiaoqing Li,et al. Provably Secure and Subliminal-Free Variant of Schnorr Signature , 2013, ICT-EurAsia.
[25] Gustavus J. Simmons,et al. The Prisoners' Problem and the Subliminal Channel , 1983, CRYPTO.
[26] Moni Naor,et al. Number-theoretic constructions of efficient pseudo-random functions , 2004, JACM.
[27] Taher El Gamal. A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, IEEE Trans. Inf. Theory.
[28] Alfred Menezes,et al. The Elliptic Curve Digital Signature Algorithm (ECDSA) , 2001, International Journal of Information Security.
[29] Dong Hoon Lee,et al. Provably Secure Encrypt-then-Sign Composition in Hybrid Signcryption , 2002, ICISC.
[30] Sean Turner,et al. Transport Layer Security , 2014, IEEE Internet Computing.