Subvert KEM to Break DEM: Practical Algorithm-Substitution Attacks on Public-Key Encryption

Rongmao Chen, Xinyi Huang, Moti Yung. Subvert KEM to Break DEM: Practical Algorithm-Substitution Attacks on Public-Key Encryption. IACR Cryptology ePrint Archive, 2020:1079, 2020. [doi]

Authors

Rongmao Chen

This author has not been identified. Look up 'Rongmao Chen' in Google

Xinyi Huang

This author has not been identified. Look up 'Xinyi Huang' in Google

Moti Yung

This author has not been identified. Look up 'Moti Yung' in Google