D. F. Aranha, P. A. Fouque, C. Qian, M. Tibouchi, and J. C. Zapalowicz, Binary elligator squared, Selected Areas in Cryptography -SAC 2014, vol.8781, pp.20-37, 2014.
URL : https://hal.archives-ouvertes.fr/hal-01094083

E. B. Barker and J. M. Kelsey, Recommendation for Random Number Generation Using Deterministic Random Bit Generators, Tech. rep, 2015.

M. Bellare and V. T. Hoang, Resisting randomness subversion: Fast deterministic and hedged public-key encryption in the standard model, Advances in Cryptology -EUROCRYPT 2015, vol.9056, pp.627-656, 2015.

M. Bellare, J. Jaeger, and D. Kane, Mass-surveillance without the state: Strongly undetectable algorithm-substitution attacks, Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security -CCS '15, pp.1431-1440, 2015.

M. Bellare, K. G. Paterson, and P. Rogaway, Security of symmetric encryption against mass surveillance, Advances in Cryptology -CRYPTO 2014, vol.8616, pp.1-19, 2014.

D. J. Bernstein, M. Hamburg, A. Krasnova, and T. Lange, Elligator: elliptic-curve points indistinguishable from uniform random strings, Proceedings of the 2013

, ACM SIGSAC Conference on Computer and Communications Security -CCS '13, pp.967-980, 2013.

Y. Dodis, I. Mironov, and N. Stephens-davidowitz, Message transmission with reverse firewalls -secure communication on corrupted machines, Advances in Cryptology -CRYPTO 2016, vol.9814, pp.341-372, 2016.

K. Gjøsteen, Comments on dual-ec-drbg/nist sp 800-90, draft, 2005.

Z. Go??biewski, M. Kuty?owski, and F. Zagórski, Stealing secrets with SSL/TLS and SSH -kleptographic attacks, Cryptology and Network Security -CANS '06, vol.4301, pp.191-202, 2006.

M. Green, R. Droms, R. Housley, P. Turner, and S. Fenter, Data Center use of Static Diffie-Hellman in TLS 1.3. RFC Draft, 2017.

R. Housley and R. Droms, TLS 1.3 Option for Negotiation of Visibility in the Datacenter, RFC Draft, 2018.

D. Kucner and M. Kuty?owski, Stochastic Kleltography Detecion, Public-Key Cryptography and Computational Number Theory, pp.137-149, 2001.

I. Mironov and N. Stephens-davidowitz, Cryptographic reverse firewalls, Advances in Cryptology -EUROCRYPT 2015, vol.9056, pp.657-686

. Springer, , 2015.

P. Rogaway, Evaluation of some blockcipher modes of operation, Cryptography Research and Evaluation Committees (CRYPTREC) for the Government of Japan, 2011.

A. Russell, Q. Tang, M. Yung, and H. S. Zhou, Cliptography: Clipping the power of kleptographic attacks, Advances in Cryptology -ASIACRYPT 2016, vol.10032, pp.34-64, 2016.

A. Russell, Q. Tang, M. Yung, and H. S. Zhou, Generic semantic security against a kleptographic adversary, Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security -CCS '17, pp.907-922, 2017.

S. Checkoway, On the practical exploitability of dual ec in tls implementations, SEC'14 Proceedings of the 23rd USENIX conference on Security Symposium, pp.319-335, 2014.

A. Young and M. Yung, The dark side of "black-box" cryptography or: Should we trust capstone?, Advances in Cryptology -CRYPTO '96, vol.1109, pp.89-103, 1996.

A. Young and M. Yung, Kleptography: Using cryptography against cryptography, Advances in Cryptology -EUROCRYPT '97, vol.1233, pp.62-74, 1997.

A. Young and M. Yung, Malicious Cryptography: Exposing Cryptovirology, 2004.

A. Young and M. Yung, Space-efficient kleptography without random oracles, Information Hiding: 9th International Workshop, IH 2007, vol.4567, pp.112-129, 2007.

A. Young and M. Yung, Kleptography from standard assumptions and applications, Security and Cryptography for Networks, vol.9841, pp.271-290, 2010.