Author:
Jiang Changsong,Xu Chunxiang,Chen Jie,Chen Kefei
Publisher
Springer Science and Business Media LLC
Reference35 articles.
1. Young A, Yung M. The dark side of “black-box” cryptography or: should we trust capstone? In: Proceedings of Annual International Cryptology Conference, 1996. 89–103
2. Young A, Yung M. Kleptography: using cryptography against cryptography. In: Proceedings of International Conference on the Theory and Applications of Cryptographic Techniques, 1997. 62–74
3. Perlroth N, Larson J, Shane S. NSA able to foil basic safeguards of privacy on web. The New York Times, 2013. http://www.nytimes.com/2013/09/06/us/nsa-foils-much-internet-encryption.html
4. Bellare M, Paterson K G, Rogaway P. Security of symmetric encryption against mass surveillance. In: Proceedings of Annual Cryptology Conference, 2014. 1–19
5. Bellare M, Jaeger J, Kane D. Mass-surveillance without the state: strongly undetectable algorithm-substitution attacks. In: Proceedings of the 22nd ACM Conference on Computer and Communications Security, 2015. 1431–1440