Abstract. Motivated by revelations concerning population-wide surveillance of encrypted communications, we formalize and investigate the resistance of symmetric encryption schemes to mass surveillance. The focus is on algorithm-substitution attacks (ASAs), where a subverted encryption algorithm replaces the real one. We assume that the goal of “big brother ” is undetectable subversion, meaning that ciphertexts produced by the subverted encryption algorithm should reveal plaintexts to big brother yet be indistinguishable to users from those produced by the real encryption scheme. We formalize security notions to capture this goal and then offer both attacks and defenses. In the first category we show that successful (from the point of view o...
Abstract. At TCC 2005, Backes and Cachin proposed a new and very strong notion of security for publi...
We put forward the notion of self-guarding cryptographic protocols as a countermeasure to algorithm ...
We put forward the notion of self-guarding cryptographic protocols as a countermeasure to algorithm ...
Abstract. At CRYPTO 2014 Bellare, Paterson, and Rogaway (BPR) presented a formal treatment of symmet...
We present new algorithm-substitution attacks (ASAs) on symmetric encryption that im-prove over prio...
At CRYPTO 2014 Bellare, Paterson, and Rogaway (BPR) presented a formal treatment of symmetric encryp...
We present new algorithm-substitution attacks (ASAs) on symmetric encryption that improve over prior...
Abstract Following the line of work presented recently by Bellare, Pa-terson and Rogaway, we formali...
Following the line of work presented recently by Bellare, Paterson and Rogaway, we formalize and inv...
This work introduces Algorithm Substitution Attacks (ASAs) on message authentication schemes. In lig...
This work introduces Algorithm Substitution Attacks (ASAs) on message authentication schemes. In lig...
This work introduces a new class of Algorithm Substitution Attack (ASA) on Symmetric Encryption Sche...
In this paper, we study algorithm substitution attacks (ASAs), where an algorithm in a cryptographic...
In this paper, we study algorithm substitution attacks (ASAs), where an algorithm in a cryptographic...
The field of cryptography has made incredible progress in the last several decades. With the formali...
Abstract. At TCC 2005, Backes and Cachin proposed a new and very strong notion of security for publi...
We put forward the notion of self-guarding cryptographic protocols as a countermeasure to algorithm ...
We put forward the notion of self-guarding cryptographic protocols as a countermeasure to algorithm ...
Abstract. At CRYPTO 2014 Bellare, Paterson, and Rogaway (BPR) presented a formal treatment of symmet...
We present new algorithm-substitution attacks (ASAs) on symmetric encryption that im-prove over prio...
At CRYPTO 2014 Bellare, Paterson, and Rogaway (BPR) presented a formal treatment of symmetric encryp...
We present new algorithm-substitution attacks (ASAs) on symmetric encryption that improve over prior...
Abstract Following the line of work presented recently by Bellare, Pa-terson and Rogaway, we formali...
Following the line of work presented recently by Bellare, Paterson and Rogaway, we formalize and inv...
This work introduces Algorithm Substitution Attacks (ASAs) on message authentication schemes. In lig...
This work introduces Algorithm Substitution Attacks (ASAs) on message authentication schemes. In lig...
This work introduces a new class of Algorithm Substitution Attack (ASA) on Symmetric Encryption Sche...
In this paper, we study algorithm substitution attacks (ASAs), where an algorithm in a cryptographic...
In this paper, we study algorithm substitution attacks (ASAs), where an algorithm in a cryptographic...
The field of cryptography has made incredible progress in the last several decades. With the formali...
Abstract. At TCC 2005, Backes and Cachin proposed a new and very strong notion of security for publi...
We put forward the notion of self-guarding cryptographic protocols as a countermeasure to algorithm ...
We put forward the notion of self-guarding cryptographic protocols as a countermeasure to algorithm ...