Publisher
Springer International Publishing
Reference8 articles.
1. Easttom, C. (2018a) An Overview of Cryptographic Backdoors. Journal of Information System Security, 13 (3), 177–185.
2. Easttom, C. (2018b). A Study of Cryptographic Backdoors in Cryptographic Primitives. In Electrical Engineering (ICEE), Iranian Conference on (pp. 1664–1669). IEEE
3. Joux, A., & Youssef, A. (Eds.). (2014). Selected Areas in Cryptography--SAC 2014: 21st International Conference, Montreal, QC, Canada, August 14–15, 2014, Revised Selected Papers (Vol. 8781). Springer.
4. Landau, S. (2014). Highlights from making sense of Snowden, part II: What’s significant in the NSA revelations. IEEE Security & Privacy, 12(1), 62-64.
5. Scott, M. (2013). Backdoors in NIST elliptic curves. https://www.certivox.com/blog/bid/344797/Backdoors-in-NIST-elliptic-curves.