共 40 条
[2]
[Anonymous], 2017, Probability and Computing: Randomization and Probabilistic Techniques in Algorithms and Data Analysis
[3]
Subversion-Resilient Signature Schemes
[J].
CCS'15: PROCEEDINGS OF THE 22ND ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY,
2015,
:364-375
[4]
Backes M, 2005, LECT NOTES COMPUT SC, V3378, P210
[5]
Mass-surveillance without the State: Strongly Undetectable Algorithm-Substitution Attacks
[J].
CCS'15: PROCEEDINGS OF THE 22ND ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY,
2015,
:1431-1440
[6]
Bellare M, 2014, LECT NOTES COMPUT SC, V8616, P1, DOI 10.1007/978-3-662-44371-2_1
[7]
Algorithm Substitution Attacks from a Steganographic Perspective
[J].
CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY,
2017,
:1649-1660
[9]
Canetti R, 2003, LECT NOTES COMPUT SC, V2729, P565
[10]
Covert multi-party computation
[J].
48TH ANNUAL IEEE SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE, PROCEEDINGS,
2007,
:238-248