all InfoSec news
Subverting Cryptographic Protocols from A Fine-Grained Perspective - A Case Study on 2-Party ECDSA
April 26, 2024, 2:06 a.m. |
IACR News www.iacr.org
ePrint Report: Subverting Cryptographic Protocols from A Fine-Grained Perspective - A Case Study on 2-Party ECDSA
Jialiu Cheng, Yi Wang, Rongmao Chen, Xinyi Huang
The revelations of Edward Snowden in 2013 rekindled concerns within the cryptographic community regarding the potential subversion of cryptographic systems. Bellare et al. (CRYPTO'14) introduced the notion of Algorithm Substitution Attacks (ASAs), which aim to covertly leak sensitive information by undermining individual cryptographic primitives. In this work, we delve deeply into the realm of ASAs against …
case chen community cryptographic ecdsa edward snowden eprint report party perspective protocols report snowden study subversion systems wang
More from www.iacr.org / IACR News
Secure Coded Distributed Computing
2 days, 6 hours ago |
www.iacr.org
Secure Implementation of SRAM PUF for Private Key Generation
2 days, 6 hours ago |
www.iacr.org
Multiple academic teaching positions
3 days, 5 hours ago |
www.iacr.org
Jobs in InfoSec / Cybersecurity
Information Assurance Security Specialist (IASS)
@ OBXtek Inc. | United States
Cyber Security Technology Analyst
@ Airbus | Bengaluru (Airbus)
Vice President, Cyber Operations Engineer
@ BlackRock | LO9-London - Drapers Gardens
Cryptography Software Developer
@ Intel | USA - AZ - Chandler
Lead Consultant, Geology
@ WSP | Richmond, VA, United States
BISO Cybersecurity Director
@ ABM Industries | Alpharetta, GA, United States