Show simple item record

dc.contributor.authorKuhn, Markus
dc.date.accessioned2019-05-06T23:30:09Z
dc.date.available2019-05-06T23:30:09Z
dc.date.issued2018-11
dc.identifier.issn0001-0782
dc.identifier.urihttps://www.repository.cam.ac.uk/handle/1810/292421
dc.description.abstractImagine you are a cyber spy. Your day job is to tap cryptographically protected communications systems. But how? Straightforward cryptanalysis has long become impractical: the task of breaking modern algorithms, if implemented correctly, far exceeds all computational power available to humanity. That leaves sabotage.
dc.publisherAssociation for Computing Machinery (ACM)
dc.rightsAll rights reserved
dc.titleTechnical Perspective Backdoor Engineering
dc.typeArticle
prism.endingPage147
prism.issueIdentifier11
prism.publicationDate2018
prism.publicationNameCOMMUNICATIONS OF THE ACM
prism.startingPage147
prism.volume61
dc.identifier.doi10.17863/CAM.39578
dcterms.dateAccepted2018-03-09
rioxxterms.versionofrecord10.1145/3266289
rioxxterms.versionAM
rioxxterms.licenseref.urihttp://www.rioxx.net/licenses/all-rights-reserved
rioxxterms.licenseref.startdate2018-11
dc.contributor.orcidKuhn, Markus [0000-0003-3902-5435]
dc.identifier.eissn1557-7317
rioxxterms.typeJournal Article/Review
rioxxterms.freetoread.startdate2019-11-30


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record