Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 225,954,652 papers from all fields of science
Search
Sign In
Create Free Account
Kleptography
Known as:
Kleptogram
, Kleptographic
, Kleptographic attack
Kleptography is the study of stealing information securely and subliminally. Kleptography is a subfield of cryptovirology and is a natural extension…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
18 relations
Backdoor (computing)
Computational indistinguishability
CrypTool
Cryptographically secure pseudorandom number generator
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2020
2020
How to transform the Apple's application 'Find My' into a toolbox for whistleblowers
A. M. Kane
arXiv.org
2020
Corpus ID: 214743152
The recent introduction of Find My app by Apple will open a large window of opportunities for whistleblowers. Based on a short…
Expand
2020
2020
Consideration on Kleptographic Attack on Cryptocurrency Monero
Minami Sho
,
Nishide Takashi
2020
Corpus ID: 219125003
2019
2019
Managing Your Kleptographic Subscription Plan
George Teşeleanu
IACR Cryptology ePrint Archive
2019
Corpus ID: 60442859
In the classical kleptographic business models, the manufacturer of a device D is paid either in advance or in installments by a…
Expand
2010
2010
Two-Head Dragon Protocol: Preventing Cloning of Signature Keys - Work in Progress
Przemysław Błaśkiewicz
,
Przemysław Kubiak
,
Mirosław Kutyłowski
International Conference on Trusted Systems
2010
Corpus ID: 44401471
Cryptographic techniques based on possession of private keys rely very much on the assumption that the private keys can be used…
Expand
2006
2006
Kleptographic Attacks on E-Voting Schemes
Marcin Gogolewski
,
M. Klonowski
,
Przemysław Kubiak
,
Mirosław Kutyłowski
,
Anna Lauks-Dutka
,
Filip Zagórski
Emerging Trends in Information and Communication…
2006
Corpus ID: 31730201
We analyze electronic voting schemes and show that in many cases it is quite easy to implement a kleptographic channel, which is…
Expand
2006
2006
Kleptographic Weaknesses in Benaloh-Tuinstra Protocol
Piotr Borzecki
,
J. Kabarowski
,
Przemysław Kubiak
,
Mirosław Kutyłowski
,
Filip Zagórski
International Conference on Systems and Networks…
2006
Corpus ID: 13566480
During designing of cryptographic protocols, their participants are usually identified with software or hardware they use…
Expand
2006
2006
Computing Science Pret a Voter with Paillier Encryption Pret a Voter with Paillier Encryption Bibliographical Details Pret a Voter with Paillier Encryption
P. Ryan
,
By
2006
Corpus ID: 264221827
In a previous paper, a version of the Pret a Voter verifiable election scheme using ElGamal encryption and enabling the use of re…
Expand
2005
2005
A Weak-Randomizer Attack on RSA-OAEP with e = 3
Daniel R. L. Brown
IACR Cryptology ePrint Archive
2005
Corpus ID: 11378966
Coppersmith’s heuristic algorithm for finding small roots of bivariate modular equations can be applied against low-exponent RSA…
Expand
2005
2005
Topics in Cryptology - CT-RSA 2005, The Cryptographers' Track at the RSA Conference 2005, San Francisco, CA, USA, February 14-18, 2005, Proceedings
C. Freytag
The Cryptographer's Track at RSA Conference
2005
Corpus ID: 37265714
Thank you very much for reading topics in cryptology ct rsa 2005 the cryptographers track at the rsa conference 2005 san…
Expand
1998
1998
Monkey: Black-Box Symmetric Ciphers Designed for MONopolizing KEYs
Adam L. Young
,
M. Yung
Fast Software Encryption Workshop
1998
Corpus ID: 12600434
We consider the problem of designing a black-box symmetric cipher that leaks information subliminally and exclusively to the…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE