Author:
Bemmann Pascal,Berndt Sebastian,Chen Rongmao
Publisher
Springer Nature Switzerland
Reference32 articles.
1. Armour, M., Poettering, B.: Algorithm substitution attacks against receivers. Int. J. Inf. Secur. 21(5), 1027–1050 (2022)
2. Ateniese, G., Magri, B., Venturi, D.: Subversion-resilient signature schemes. In: Ray, I., Li, N., Kruegel, C. (eds.) ACM CCS 2015: 22nd Conference on Computer and Communications Security, pp. 364–375. ACM Press, October 2015
3. Baek, J., Susilo, W., Kim, J., Chow, Y.W.: Subversion in practice: how to efficiently undermine signatures. Cryptology ePrint Archive, Report 2018/1201 (2018). https://eprint.iacr.org/2018/1201
4. Bellare, M., Jaeger, J., Kane, D.: Mass-surveillance without the state: strongly undetectable algorithm-substitution attacks. In: Ray, I., Li, N., Kruegel, C. (eds.) ACM CCS 2015: 22nd Conference on Computer and Communications Security, pp. 1431–1440. ACM Press, October 2015
5. Lecture Notes in Computer Science;M Bellare,2014