Academic literature on the topic 'Kleptography'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Kleptography.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Kleptography"
Oleksandr Polevod, Oleksandr Polevod. "Kleptography in information security context. Classification of kleptographic attacks." Technical sciences and technologies, no. 4 (38) (December 30, 2024): 208–13. https://doi.org/10.25140/2411-5363-2024-4(38)-208-213.
Full textLu, Yibiao, Zecheng Wu, Bingsheng Zhang, and Kui Ren. "Efficient Secure Computation from SM Series Cryptography." Wireless Communications and Mobile Computing 2023 (May 17, 2023): 1–26. http://dx.doi.org/10.1155/2023/6039034.
Full textAnjan, K., N. K. Srinath, and Abraham Jibi. "ENTROPY BASED DETECTION ANDBEHAVIORAL ANALYSIS OF HYBRID COVERT CHANNELIN SECURED COMMUNICATION." International Journal of Network Security & Its Applications (IJNSA) 7, no. 3 (2015): 39–53. https://doi.org/10.5281/zenodo.8252269.
Full textKutyłowski, Mirosław, Anna Lauks-Dutka, Przemysław Kubiak, and Marcin Zawada. "FIDO2 Facing Kleptographic Threats By-Design." Applied Sciences 14, no. 23 (2024): 11371. https://doi.org/10.3390/app142311371.
Full textMarkelova, A. V. "Kleptographic (algorithmic) backdoors in the RSA key generator." Prikladnaya Diskretnaya Matematika, no. 55 (2022): 14–34. http://dx.doi.org/10.17223/20710410/55/2.
Full textSajjad, Anum, Mehreen Afzal, Mian Muhammad Waseem Iqbal, Haider Abbas, Rabia Latif, and Rana Aamir Raza. "Kleptographic Attack on Elliptic Curve Based Cryptographic Protocols." IEEE Access 8 (2020): 139903–17. http://dx.doi.org/10.1109/access.2020.3012823.
Full textJiang, Changsong, Chunxiang Xu, Jie Chen, and Kefei Chen. "Blockchain-based immunization against kleptographic attacks." Science China Information Sciences 67, no. 7 (2024). http://dx.doi.org/10.1007/s11432-023-3883-4.
Full textКудін, Антон Михайлович, and Богдан Анатолійович Коваленко. "Development of kleptographic mechanisms into hash functions." Ukrainian Information Security Research Journal 21, no. 2 (2019). http://dx.doi.org/10.18372/2410-7840.21.13770.
Full textShivale, Saurabh Anandrao. "Cryptovirology: Virus Approach." July 31, 2011. https://doi.org/10.5121/ijnsa.2011.3404.
Full textDissertations / Theses on the topic "Kleptography"
Коваленко, Богдан Анатолiйович, та Bohdan Kovalenko. "Методи побудови клептографiчних механiзмiв та систем стiйких до клептографiчних модифiкацiй". Thesis, Національний авіаційний університет, 2020. https://er.nau.edu.ua/handle/NAU/44188.
Full textBook chapters on the topic "Kleptography"
Chen, Rongmao, Yi Wang, Xinyi Huang, Jian Weng, and Moti Yung. "Kleptography." In Encyclopedia of Cryptography, Security and Privacy. Springer Berlin Heidelberg, 2024. http://dx.doi.org/10.1007/978-3-642-27739-9_1830-1.
Full textChen, Rongmao, Yi Wang, Xinyi Huang, Jian Weng, and Moti Yung. "Kleptography." In Encyclopedia of Cryptography, Security and Privacy. Springer Nature Switzerland, 2025. https://doi.org/10.1007/978-3-030-71522-9_1830.
Full textYoung, Adam, and Moti Yung. "Kleptography: Using Cryptography Against Cryptography." In Advances in Cryptology — EUROCRYPT ’97. Springer Berlin Heidelberg, 1997. http://dx.doi.org/10.1007/3-540-69053-0_6.
Full textJanovsky, Adam, Jan Krhovjak, and Vashek Matyas. "Bringing Kleptography to Real-World TLS." In Information Security Theory and Practice. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-20074-9_3.
Full textYoung, Adam L., and Moti M. Yung. "Space-Efficient Kleptography Without Random Oracles." In Information Hiding. Springer Berlin Heidelberg, 2007. http://dx.doi.org/10.1007/978-3-540-77370-2_8.
Full textYoung, Adam, and Moti Yung. "Kleptography from Standard Assumptions and Applications." In Lecture Notes in Computer Science. Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-15317-4_18.
Full textTeşeleanu, George. "Unifying Kleptographic Attacks." In Secure IT Systems. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-03638-6_5.
Full textYoung, Adam, and Moti Yung. "Bandwidth-Optimal Kleptographic Attacks." In Cryptographic Hardware and Embedded Systems — CHES 2001. Springer Berlin Heidelberg, 2001. http://dx.doi.org/10.1007/3-540-44709-1_20.
Full textYoung, Adam, and Moti Yung. "Malicious Cryptography: Kleptographic Aspects." In Lecture Notes in Computer Science. Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/978-3-540-30574-3_2.
Full textTeşeleanu, George. "Managing Your Kleptographic Subscription Plan." In Codes, Cryptology and Information Security. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-16458-4_26.
Full textConference papers on the topic "Kleptography"
Heßeling, Carina, Jörg Keller, and Sebastian Litzinger. "Kleptography in Authentication Protocols: Why is it Still Possible?" In EICC 2022: European Interdisciplinary Cybersecurity Conference. ACM, 2022. http://dx.doi.org/10.1145/3528580.3532998.
Full textBorzecki, Piotr, Jedrzej Kabarowski, Przemyslaw Kubiak, Miroslaw Kutylowski, and Filip Zagorski. "Kleptographic Weaknesses in Benaloh-Tuinstra Protocol." In 2006 International Conference on Systems and Networks Communications (ICSNC'06). IEEE, 2006. http://dx.doi.org/10.1109/icsnc.2006.50.
Full textRussell, Alexander, Qiang Tang, Moti Yung, and Hong-Sheng Zhou. "Generic Semantic Security against a Kleptographic Adversary." In CCS '17: 2017 ACM SIGSAC Conference on Computer and Communications Security. ACM, 2017. http://dx.doi.org/10.1145/3133956.3133993.
Full textKubiak, Przemysław, Mirosław Kutyłowski, and Filip Zagórski. "Kleptographic attacks on a cascade of mix servers." In the 2nd ACM symposium. ACM Press, 2007. http://dx.doi.org/10.1145/1229285.1229297.
Full textRavi, Prasanna, Shivam Bhasin, Anupam Chattopadhyay, Aikata Aikata, and Sujoy Sinha Roy. "Backdooring Post-Quantum Cryptography: Kleptographic Attacks on Lattice-based KEMs." In GLSVLSI '24: Great Lakes Symposium on VLSI 2024. ACM, 2024. http://dx.doi.org/10.1145/3649476.3660373.
Full text