Binary elligator squared, Selected Areas in Cryptography -SAC 2014, vol.8781, pp.20-37, 2014. ,

URL : https://hal.archives-ouvertes.fr/hal-01094083

Recommendation for Random Number Generation Using Deterministic Random Bit Generators, Tech. rep, 2015. ,

Resisting randomness subversion: Fast deterministic and hedged public-key encryption in the standard model, Advances in Cryptology -EUROCRYPT 2015, vol.9056, pp.627-656, 2015. ,

Mass-surveillance without the state: Strongly undetectable algorithm-substitution attacks, Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security -CCS '15, pp.1431-1440, 2015. ,

Security of symmetric encryption against mass surveillance, Advances in Cryptology -CRYPTO 2014, vol.8616, pp.1-19, 2014. ,

Elligator: elliptic-curve points indistinguishable from uniform random strings, Proceedings of the 2013 ,

, ACM SIGSAC Conference on Computer and Communications Security -CCS '13, pp.967-980, 2013.

Message transmission with reverse firewalls -secure communication on corrupted machines, Advances in Cryptology -CRYPTO 2016, vol.9814, pp.341-372, 2016. ,

Comments on dual-ec-drbg/nist sp 800-90, draft, 2005. ,

Stealing secrets with SSL/TLS and SSH -kleptographic attacks, Cryptology and Network Security -CANS '06, vol.4301, pp.191-202, 2006. ,

, Data Center use of Static Diffie-Hellman in TLS 1.3. RFC Draft, 2017.

TLS 1.3 Option for Negotiation of Visibility in the Datacenter, RFC Draft, 2018. ,

Stochastic Kleltography Detecion, Public-Key Cryptography and Computational Number Theory, pp.137-149, 2001. ,

Cryptographic reverse firewalls, Advances in Cryptology -EUROCRYPT 2015, vol.9056, pp.657-686 ,

, , 2015.

Evaluation of some blockcipher modes of operation, Cryptography Research and Evaluation Committees (CRYPTREC) for the Government of Japan, 2011. ,

Cliptography: Clipping the power of kleptographic attacks, Advances in Cryptology -ASIACRYPT 2016, vol.10032, pp.34-64, 2016. ,

Generic semantic security against a kleptographic adversary, Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security -CCS '17, pp.907-922, 2017. ,

On the practical exploitability of dual ec in tls implementations, SEC'14 Proceedings of the 23rd USENIX conference on Security Symposium, pp.319-335, 2014. ,

The dark side of "black-box" cryptography or: Should we trust capstone?, Advances in Cryptology -CRYPTO '96, vol.1109, pp.89-103, 1996. ,

Kleptography: Using cryptography against cryptography, Advances in Cryptology -EUROCRYPT '97, vol.1233, pp.62-74, 1997. ,

, Malicious Cryptography: Exposing Cryptovirology, 2004.

Space-efficient kleptography without random oracles, Information Hiding: 9th International Workshop, IH 2007, vol.4567, pp.112-129, 2007. ,

Kleptography from standard assumptions and applications, Security and Cryptography for Networks, vol.9841, pp.271-290, 2010. ,