Skip to main navigation
Skip to search
Skip to main content
New Jersey Institute of Technology Home
Help & FAQ
Home
Profiles
Research units
Facilities
Federal Grants
Research output
Press/Media
Search by expertise, name or affiliation
Cliptography: Clipping the power of kleptographic attacks
Alexander Russell
, Qiang Tang
, Moti Yung
, Hong Sheng Zhou
Computer Science
Research output
:
Chapter in Book/Report/Conference proceeding
›
Conference contribution
71
Scopus citations
Overview
Fingerprint
Fingerprint
Dive into the research topics of 'Cliptography: Clipping the power of kleptographic attacks'. Together they form a unique fingerprint.
Sort by
Weight
Alphabetically
Keyphrases
Subversion
100%
One-way Permutation
80%
Backdoor
60%
Pseudorandom number Generator
60%
Cryptosystem
40%
Cryptographic Primitives
40%
Key Generation
40%
Immunization Strategy
40%
Crypto
40%
Trapdoor
40%
Instantiation
20%
Insecurity
20%
Cryptography
20%
Attack Model
20%
Random Component
20%
Reference Implementation
20%
Program Model
20%
Practical Deployment
20%
Random Key
20%
Symmetric Key Encryption Algorithm
20%
Digital Signature Scheme
20%
Kleptography
20%
Ganesh
20%
Cryptographic
20%
Black-box Reductions
20%
Folklore
20%
Existential Unforgeability
20%
Computer Science
Backdoors
100%
Cryptographic Primitive
66%
Key Generation
66%
Instantiation
33%
Cryptography
33%
Attack Model
33%
Reference Implementation
33%
Encryption
33%
Cryptographic System
33%
Digital Signature Scheme
33%
Symmetric Key Encryption
33%