@InProceedings{horel_et_al:LIPIcs.ITCS.2019.42, author = {Horel, Thibaut and Park, Sunoo and Richelson, Silas and Vaikuntanathan, Vinod}, title = {{How to Subvert Backdoored Encryption: Security Against Adversaries that Decrypt All Ciphertexts}}, booktitle = {10th Innovations in Theoretical Computer Science Conference (ITCS 2019)}, pages = {42:1--42:20}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-95977-095-8}, ISSN = {1868-8969}, year = {2019}, volume = {124}, editor = {Blum, Avrim}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2019.42}, URN = {urn:nbn:de:0030-drops-101355}, doi = {10.4230/LIPIcs.ITCS.2019.42}, annote = {Keywords: Backdoored Encryption, Steganography} }
The metadata provided by Dagstuhl Publishing on its webpages, as well as their export formats (such as XML or BibTeX) available at our website, is released under the CC0 1.0 Public Domain Dedication license. That is, you are free to copy, distribute, use, modify, transform, build upon, and produce derived works from our data, even for commercial purposes, all without asking permission. Of course, we are always happy if you provide a link to us as the source of the data.
Read the full CC0 1.0 legal code for the exact terms that apply: https://creativecommons.org/publicdomain/zero/1.0/legalcode
Feedback for Dagstuhl Publishing