Post-Snowden Cryptography:
How to defend against Kleptographic attacks
Research and teaching activities:
- My collaborators, Professors Qiang Tang and
Moti Yung
gave a 3-hour tutorial on our recent efforts on how to
defend against kleptographic attacks at CCS 2017!
Research papers:
- Let a Non-Barking Watchdog Bite: Cliptographic
Signatures with an Offline Watchdog
Sherman Chow, Alexander Russell, Qiang Tang, Moti Yung, Yongjun Zhao, Hong-Sheng Zhou
PKC 2019 -- Public Key Cryptography
- Correcting Subverted Random Oracles
Alexander Russell, Qiang Tang, Moti Yung, Hong-Sheng Zhou
CRYPTO 2018 -- Advances in Cryptology
- Generic Semantic
Security against a Kleptographic Adversary
Alexander Russell, Qiang Tang, Moti Yung, Hong-Sheng Zhou
CCS 2017 -- ACM Conference on Computer and Communications Security
Seminar talk slides
- Cliptography:
Clipping the Power of Kleptographic Attacks
Alexander Russell, Qiang Tang, Moti Yung, Hong-Sheng Zhou
ASIACRYPT 2016 -- Advances in Cryptology
Oral presentation at SAT 2015 -- Workshop on Surveillance and Technology
Invited to Journal of Cryptology
- Secure Multi-Party Computation in the presence of
Kleptographic Attacks
Alexander Russell, Qiang Tang, Phuc Thai, Moti Yung, Hong-Sheng Zhou
Manuscript
- Distributing
the Setup in Universally Composable Multi-Party
Computation
Jonathan Katz, Aggelos Kiayias, Hong-Sheng Zhou, Vassilis Zikas
PODC 2014 -- ACM Symposium on Principles of Distributed Computing
Research resources:
External collaborators:
Alexander
Russell (UConn), Qiang Tang
(NJIT), Moti
Yung (Google and Columbia), Matt Green
(JHU)