Ransomware and the Legacy Crypto API
暂无分享,去创建一个
Jean-Louis Lanet | Axel Legay | Hélène Le Bouder | Colas Le Guernic | Aurélien Palisse | Jean-Louis Lanet | Axel Legay | C. J. Guernic | Aurélien Palisse
[1] Helger Lipmaa,et al. Comments to NIST concerning AES Modes of Operations: CTR-Mode Encryption , 2000 .
[2] Moti Yung,et al. Cryptovirology: extortion-based security threats and countermeasures , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.
[3] Leyla Bilge,et al. Cutting the Gordian Knot: A Look Under the Hood of Ransomware Attacks , 2015, DIMVA.
[4] Paul F. Syverson,et al. A taxonomy of replay attacks [cryptographic protocols] , 1994, Proceedings The Computer Security Foundations Workshop VII.
[5] Daniel J. Bernstein,et al. The Salsa20 Family of Stream Ciphers , 2008, The eSTREAM Finalists.
[6] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[7] Tibor Juhas. The use of elliptic curves in cryptography , 2007 .
[8] Sébastien Josse,et al. White-box attack context cryptovirology , 2009, Journal in Computer Virology.
[9] Galen C. Hunt,et al. Detours: binary interception of Win32 functions , 1999 .
[10] Alexandre Gazet,et al. Comparative analysis of various ransomware virii , 2010, Journal in Computer Virology.