共 36 条
[1]
Abdalla M, 2010, LECT NOTES COMPUT SC, V5978, P480, DOI 10.1007/978-3-642-11799-2_28
[2]
Subversion-Resilient Signature Schemes
[J].
CCS'15: PROCEEDINGS OF THE 22ND ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY,
2015,
:364-375
[3]
Backes M, 2005, LECT NOTES COMPUT SC, V3378, P210
[4]
Banfi F., 2023, Report 2023/249
[5]
Bellare M., 1994, LECT NOTES COMPUTER, VVolume 950, P92, DOI DOI 10.1007/BFB0053428
[6]
Mass-surveillance without the State: Strongly Undetectable Algorithm-Substitution Attacks
[J].
CCS'15: PROCEEDINGS OF THE 22ND ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY,
2015,
:1431-1440
[7]
Bellare M, 2014, LECT NOTES COMPUT SC, V8616, P1, DOI 10.1007/978-3-662-44371-2_1
[8]
Algorithm Substitution Attacks from a Steganographic Perspective
[J].
CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY,
2017,
:1649-1660
[9]
Bernstein D. J., 2013, 2013 ACM SIGSAC C CO, P967
[10]
Cramer R, 2002, LECT NOTES COMPUT SC, V2332, P45