Post-Snowden Cryptography
Bibliography
a selective collection of research papers on cryptographic
technologies in the post-Snowden era.
maintained by Hong-Sheng
Zhou; updated 9/30/2017; work in progress; stay tuned!
Kleptographic Attacks
(1996-2013)
- The Dark Side of "Black-Box"
Cryptography, or: Should We Trust Capstone?
Adam Young, Moti Yung
Crypto 1996
- Cryptovirology:
Extortion-Based Security Threats and Countermeasures
Adam Young, Moti Yung
S&P 1996
Kleptographic Attacks and Defenses (2014- present)
- Security of Symmetric Encryption against Mass Surveillance
Mihir Bellare, Kenneth G. Paterson, Phillip Rogaway
Crypto 2014
- Cryptographic Reverse Firewalls
Ilya Mironov and Noah Stephens-Davidowitz
Eurocrypt 2015
https://eprint.iacr.org/2014/758
- Resisting Randomness Subversion: Fast Deterministic and Hedged
Public-Key Encryption in the Standard Model
Mihir Bellare, Viet Tung Hoang
Eurocrypt 2015
https://eprint.iacr.org/2014/876
- Message Transmission with Reverse Firewalls---Secure
Communication on Corrupted Machines
Yevgeniy Dodis and Ilya Mironov and Noah Stephens-Davidowitz
Crypto 2016
https://eprint.iacr.org/2015/548
- Cliptography: Clipping the Power of Kleptographic Attacks
Alexander Russell and Qiang Tang and Moti Yung and Hong-Sheng
Zhou
Asiacrypt 2016
https://eprint.iacr.org/2015/695
- A More Cautious Approach to Security Against Mass Surveillance
Jean Paul Degabriele and Pooya Farshim and Bertram Poettering
FSE 2015
https://eprint.iacr.org/2015/748
- Mass-surveillance without the State: Strongly Undetectable
Algorithm-Substitution Attacks
Mihir Bellare, Joseph Jaeger, Daniel Kane
CCS 2015
https://eprint.iacr.org/2015/808
- Generic Semantic Security against a Kleptographic Adversary
Alexander Russell, Qiang Tang, Moti Yung, Hong-Sheng Zhou
CCS 2017
https://eprint.iacr.org/2016/530
- Backdoors in Pseudorandom Number Generators: Possibility and
Impossibility Results
Jean Paul Degabriele and Kenneth G. Paterson and Jacob C. N.
Schuldt and Joanne Woodage
Crypto 2016
https://eprint.iacr.org/2016/577
Survey, Tutorials, Talks,
etc
- Practical Kleptography
Matt Green
Invited talk, at USENIX WOOT 2014
https://www.usenix.org/conference/woot14/technical-sessions/presentation/practical-kleptography
- The Moral Character of Cryptographic Work
Phillip Rogaway
IACR Distinguished Lecture, at Asiacrypt 2015; video link
http://web.cs.ucdavis.edu/~rogaway/papers/moral.html
- The future of cryptography
Bart Preneel
IACR Distinguished Lecture, at Eurocrypt 2016; video
link
https://www.iacr.org/publications/dl/ann2016.html
- On subverting trust
Matt Green
Invited talk, at NDSS 2016; slides
available
- Cliptography:Post-Snowden Cryptography
Qiang Tang and Moti Yung
Tutorial at CCS
2017
work in progress;
I will use my spare time to make the list better and better; please
draw me a line if you have good suggestions via my email
hszhou(at) vcu edu