Cryptography with Disposable Backdoors
Backdooring cryptographic algorithms is an indisputable taboo in the cryptographic literature for a good reason: however noble the intentions, backdoors might fall in the wrong hands, in which case security is completely compromised. Nonetheless, more and more legislative pressure is being produced...
Main Authors: | Kai-Min Chung, Marios Georgiou, Ching-Yi Lai, Vassilis Zikas |
---|---|
Format: | Article |
Language: | English |
Published: |
MDPI AG
2019-08-01
|
Series: | Cryptography |
Subjects: | |
Online Access: | https://www.mdpi.com/2410-387X/3/3/22 |
Similar Items
-
A CAN-Bus Lightweight Authentication Scheme
by: Jia-Ning Luo, et al.
Published: (2021-10-01) -
Backdoor Pony: Evaluating backdoor attacks and defenses in different domains
by: Arthur Mercier, et al.
Published: (2023-05-01) -
Survey on Backdoor Attacks and Countermeasures in Deep Neural Network
by: QIAN Hanwei, SUN Weisong
Published: (2023-05-01) -
Defending Against Backdoor Attacks by Quarantine Training
by: Chengxu Yu, et al.
Published: (2024-01-01) -
Open Sesame! Design and Implementation of Backdoor to Secretly Unlock Android Devices
by: Junsung Cho, et al.
Published: (2017-11-01)