Technical Perspective Backdoor Engineering
cam.issuedOnline | 2018-10-26 | |
dc.contributor.author | Kuhn, Markus G | |
dc.contributor.orcid | Kuhn, Markus [0000-0003-3902-5435] | |
dc.date.accessioned | 2019-05-06T23:30:09Z | |
dc.date.available | 2019-05-06T23:30:09Z | |
dc.date.issued | 2018 | |
dc.description.abstract | Imagine you are a cyber spy. Your day job is to tap cryptographically protected communications systems. But how? Straightforward cryptanalysis has long become impractical: the task of breaking modern algorithms, if implemented correctly, far exceeds all computational power available to humanity. That leaves sabotage. | |
dc.identifier.doi | 10.17863/CAM.39578 | |
dc.identifier.eissn | 1557-7317 | |
dc.identifier.issn | 0001-0782 | |
dc.identifier.uri | https://www.repository.cam.ac.uk/handle/1810/292421 | |
dc.publisher | Association for Computing Machinery (ACM) | |
dc.publisher.url | http://dx.doi.org/10.1145/3266289 | |
dc.rights | All rights reserved | |
dc.subject | 46 Information and Computing Sciences | |
dc.title | Technical Perspective Backdoor Engineering | |
dc.type | Article | |
dcterms.dateAccepted | 2018-03-09 | |
prism.endingPage | 147 | |
prism.issueIdentifier | 11 | |
prism.publicationDate | 2018 | |
prism.publicationName | COMMUNICATIONS OF THE ACM | |
prism.startingPage | 147 | |
prism.volume | 61 | |
rioxxterms.licenseref.startdate | 2018-11 | |
rioxxterms.licenseref.uri | http://www.rioxx.net/licenses/all-rights-reserved | |
rioxxterms.type | Journal Article/Review | |
rioxxterms.version | AM | |
rioxxterms.versionofrecord | 10.1145/3266289 |
Files
Original bundle
1 - 1 of 1
Loading...
- Name:
- juniper-rng.pdf
- Size:
- 135.63 KB
- Format:
- Adobe Portable Document Format
- Description:
- Accepted version
- Licence
- http://www.rioxx.net/licenses/all-rights-reserved
License bundle
1 - 1 of 1
No Thumbnail Available
- Name:
- DepositLicenceAgreementv2.1.pdf
- Size:
- 150.9 KB
- Format:
- Adobe Portable Document Format