Subvert KEM to Break DEM: Practical Algorithm-Substitution Attacks on Public-Key Encryption

Rongmao Chen, Xinyi Huang, Moti Yung. Subvert KEM to Break DEM: Practical Algorithm-Substitution Attacks on Public-Key Encryption. IACR Cryptology ePrint Archive, 2020:1079, 2020. [doi]

References

No references recorded for this publication.

Cited by

No citations of this publication recorded.