1. Bellare M, Paterson KG, Rogaway P (2014) Security of symmetric encryption against mass surveillance. In: Advances in Cryptology – CRYPTO 2014: 34th Annual Cryptology Conference, Santa Barbara, CA, USA, 17–21 Aug 2014. Proceedings, Part I, vol 34. Springer, pp 1–19
2. Desmedt Y (1990) Abuses in cryptography and how to fight them. In: Advances in Cryptology – CRYPTO’88: Proceedings, vol 8. Springer, pp 375–389
3. Joux A, Loss J, Wagner B (2024) Kleptographic attacks against implicit rejection. Cryptology ePrint Archive, Paper 2024/260
4. Kilian J, Leighton T (1995) Fair cryptosystems, revisited: a rigorous approach to key-escrow. In: Annual International Cryptology Conference. Springer, pp 208–221
5. Ravi P, Bhasin S, Chattopadhyay A, Aikata, Roy SS (2022) Backdooring post-quantum cryptography: Kleptographic attacks on lattice-based KEMs. Cryptology ePrint Archive, Paper 2022/1681