Skip to search formSkip to main contentSkip to account menu

Kleptography

Known as: Kleptogram, Kleptographic, Kleptographic attack 
Kleptography is the study of stealing information securely and subliminally. Kleptography is a subfield of cryptovirology and is a natural extension… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2020
2020
The recent introduction of Find My app by Apple will open a large window of opportunities for whistleblowers. Based on a short… 
2019
2019
In the classical kleptographic business models, the manufacturer of a device D is paid either in advance or in installments by a… 
2010
2010
Cryptographic techniques based on possession of private keys rely very much on the assumption that the private keys can be used… 
2006
2006
We analyze electronic voting schemes and show that in many cases it is quite easy to implement a kleptographic channel, which is… 
2006
2006
During designing of cryptographic protocols, their participants are usually identified with software or hardware they use… 
2006
2006
In a previous paper, a version of the Pret a Voter verifiable election scheme using ElGamal encryption and enabling the use of re… 
2005
2005
Coppersmith’s heuristic algorithm for finding small roots of bivariate modular equations can be applied against low-exponent RSA… 
2005
2005
Thank you very much for reading topics in cryptology ct rsa 2005 the cryptographers track at the rsa conference 2005 san… 
1998
1998
We consider the problem of designing a black-box symmetric cipher that leaks information subliminally and exclusively to the…