Subvert KEM to Break DEM: Practical Algorithm-Substitution Attacks on Public-Key Encryption

Rongmao Chen, Xinyi Huang, Moti Yung. Subvert KEM to Break DEM: Practical Algorithm-Substitution Attacks on Public-Key Encryption. IACR Cryptology ePrint Archive, 2020:1079, 2020. [doi]

No reviews for this publication, yet.