Back to Results
First PageMeta Content
Finite fields / Cryptographic protocols / Diffie–Hellman key exchange / Kleptography / XTR / RSA / Key management / Discrete logarithm / Naor-Reingold Pseudorandom Function / Cryptography / Abstract algebra / Public-key cryptography


Kleptography: Using Cryptography Against Cryptography Adam Young* and
Add to Reading List

Document Date: 2013-09-12 07:28:33


Open Document

File Size: 834,72 KB

Share Result on Facebook

Company

Simmons / /

Country

United States / /

Event

Product Issues / Judicial Event / FDA Phase / /

Facility

University Email / /

IndustryTerm

black-box devices / setup algorithm / device / internal cryptographic tools / hardware tamper-proof device / software cryptographic facility / cryptographic systems / log systems / software implementations / hardware devices / cryptographic devices / generation device / manufacturing / contaminated devices / black-box device / cryptographic device / /

Organization

Columbia University / U.S. government / /

Person

Gus Simmons / Bob / Alice / Adam Young / /

Product

devices / DH76 / algorithm / /

Technology

encryption / contaminated algorithm / Cryptography / following algorithm / public key / setup algorithm / Diffie-Hellman key exchange protocol / private key / secret key / ElGamal encryption / /

SocialTag