Cited By
View all- Cheng JWang YChen RHuang X(2024)Subverting Cryptographic Protocols from a Fine-Grained Perspective- A Case Study on 2-Party ECDSAInformation Security and Privacy10.1007/978-981-97-5028-3_19(370-390)Online publication date: 15-Jul-2024
- Bemmann PBerndt SChen R(2024)Subversion-Resilient Signatures Without Random OraclesApplied Cryptography and Network Security10.1007/978-3-031-54770-6_14(351-375)Online publication date: 5-Mar-2024
- Bhattacharyya RNandi MRaychaudhuri A(2023)Subversion Resilient Hashing: Efficient Constructions and Modular Proofs for Crooked IndifferentiabilityIEEE Transactions on Information Theory10.1109/TIT.2023.323811569:5(3302-3315)Online publication date: 1-May-2023
- Show More Cited By