We seek constructions of general-purpose immunizers that take arbitrary cryptographic primitives, and transform them into ones that withstand a powerful “malicious but proud” adversary, who attempts to break security by possibly subverting the implementation of all algorithms (including the immunizer itself!), while trying not to be detected. This question is motivated by the recent evidence of cryptographic schemes being intentionally weakened, or designed together with hidden backdoors, e.g., with the scope of mass surveillance. Our main result is a subversion-secure immunizer in the plain model (assuming collision-resistant hashing), that works for a fairly large class of deterministic primitives, i.e., cryptoschemes where a secret (but ...
International audienceWe revisit the problem of proving that a user algorithm se-lected and correctl...
We provide a formal treatment of security of digital signatures against subversion attacks (SAs). Ou...
Abstract. Motivated by revelations concerning population-wide surveillance of encrypted communicatio...
We seek constructions of general-purpose immunizers that take arbitrary cryptographic primitives, an...
Abstract. Chosen-plaintext attacks on private-key encryption schemes are currently modeled by giving...
Abstract. Several recent and high-profile incidents give cause to believe that randomness failures o...
A backdoored Pseudorandom Generator (PRG) is a PRG which looks pseudorandom to the outside world, bu...
The question of how to construct optimally efficient secure protocols is a central question in crypt...
We provide a formal treatment of backdoored pseudorandom generators (PRGs). Here a saboteur chooses ...
Kleptography, introduced 20 years ago by Young and Yung [Crypto ’96], considers the (in)security of ...
The Snowden revelations of 2013 have shed some light on the extent of state-performed mass surveilla...
A cryptographic scheme is \provably secure " if an attack onthescheme implies an attack on ...
. In this paper, we present a simple method for generating random-based signatures when random numbe...
In this thesis, we present constructions of leakage-resilient cryptographic primitives, and we give ...
We provide a formal treatment of security of digital signatures against subversion attacks (SAs). Ou...
International audienceWe revisit the problem of proving that a user algorithm se-lected and correctl...
We provide a formal treatment of security of digital signatures against subversion attacks (SAs). Ou...
Abstract. Motivated by revelations concerning population-wide surveillance of encrypted communicatio...
We seek constructions of general-purpose immunizers that take arbitrary cryptographic primitives, an...
Abstract. Chosen-plaintext attacks on private-key encryption schemes are currently modeled by giving...
Abstract. Several recent and high-profile incidents give cause to believe that randomness failures o...
A backdoored Pseudorandom Generator (PRG) is a PRG which looks pseudorandom to the outside world, bu...
The question of how to construct optimally efficient secure protocols is a central question in crypt...
We provide a formal treatment of backdoored pseudorandom generators (PRGs). Here a saboteur chooses ...
Kleptography, introduced 20 years ago by Young and Yung [Crypto ’96], considers the (in)security of ...
The Snowden revelations of 2013 have shed some light on the extent of state-performed mass surveilla...
A cryptographic scheme is \provably secure " if an attack onthescheme implies an attack on ...
. In this paper, we present a simple method for generating random-based signatures when random numbe...
In this thesis, we present constructions of leakage-resilient cryptographic primitives, and we give ...
We provide a formal treatment of security of digital signatures against subversion attacks (SAs). Ou...
International audienceWe revisit the problem of proving that a user algorithm se-lected and correctl...
We provide a formal treatment of security of digital signatures against subversion attacks (SAs). Ou...
Abstract. Motivated by revelations concerning population-wide surveillance of encrypted communicatio...