{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,20]],"date-time":"2026-04-20T22:13:48Z","timestamp":1776723228118,"version":"3.51.2"},"reference-count":134,"publisher":"Oxford University Press (OUP)","issue":"1","license":[{"start":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T00:00:00Z","timestamp":1743033600000},"content-version":"vor","delay-in-days":85,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,1,17]]},"abstract":"<jats:title>Abstract<\/jats:title>\n               <jats:p>The essence of cryptography is secure communication in the presence of adversaries. We present an analysis of cryptography in terms of a philosophy founded on Dretske\u2019s classical philosophy of information, which naturally is built on the work of Shannon and is so amendable to being extended with the notion of adversary. The attempts to transform cryptography from an art to a science were based on formalizing the adversary, but these very formalizations fall short in the face of real-world adversaries, as demonstrated by the Snowden leaks. Nevertheless, this problem is not unique to cryptography per se, but a problem inherent in the process of abstraction itself, and so we sketch a research agenda wherein overcoming the limits of abstraction necessitates the embrace of complexity and empirical data, as well as the questioning of our own ontological assumptions.<\/jats:p>","DOI":"10.1093\/cybsec\/tyaf006","type":"journal-article","created":{"date-parts":[[2025,9,19]],"date-time":"2025-09-19T21:53:43Z","timestamp":1758318823000},"source":"Crossref","is-referenced-by-count":3,"title":["The adversary: the philosophy of cryptography"],"prefix":"10.1093","volume":"11","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2143-6965","authenticated-orcid":false,"given":"Harry","family":"Halpin","sequence":"first","affiliation":[{"name":"Nym Technologies , Place Numa-Droz 2, 2000 Neuch\u00e2tel ,","place":["Switzerland"]}]}],"member":"286","published-online":{"date-parts":[[2025,3,27]]},"reference":[{"key":"2025092301112452100_bib1","volume-title":"Knowledge and the Flow of Information","author":"Dretske","year":"1981"},{"key":"2025092301112452100_bib2","doi-asserted-by":"publisher","first-page":"197","DOI":"10.1023\/B:MIND.0000021684.50925.c9","article-title":"Outline of a theory of strongly semantic information","volume":"14","author":"Floridi","year":"2004","journal-title":"Mind Mach"},{"key":"2025092301112452100_bib3","article-title":"A mathematical theory of cryptography","volume-title":"Murray Hill: Bell Laboratories Memorandum MM 45-110-02","author":"Shannon","year":"1945"},{"key":"2025092301112452100_bib4","article-title":"The philosophy of secrecy: towards a historical analysis of cryptography, privacy, and information organization","volume-title":"Proceedings of the International Conference on Historical Cryptography (HistoCrypt)","author":"Halpin","year":"2024"},{"key":"2025092301112452100_bib5","doi-asserted-by":"crossref","DOI":"10.7551\/mitpress\/5128.001.0001","volume-title":"On the Origin of Objects","author":"Smith","year":"1996"},{"key":"2025092301112452100_bib6","doi-asserted-by":"crossref","first-page":"199","DOI":"10.1007\/978-3-642-31674-6_15","article-title":"Becoming digital: reconciling theories of digital representation and embodiment","volume-title":"Philosophy and Theory of Artificial Intelligence","author":"Halpin","year":"2013"},{"key":"2025092301112452100_bib7","doi-asserted-by":"crossref","DOI":"10.7551\/mitpress\/1881.001.0001","volume-title":"Cognition in the Wild","author":"Hutchins","year":"1995"},{"key":"2025092301112452100_bib8","doi-asserted-by":"publisher","first-page":"379","DOI":"10.1002\/j.1538-7305.1948.tb01338.x","article-title":"A mathematical theory of communication","volume":"27","author":"Shannon","year":"1948","journal-title":"Bell Syst Tech J"},{"key":"2025092301112452100_bib9","doi-asserted-by":"publisher","first-page":"243","DOI":"10.1017\/S0021853700004837","article-title":"The protectorate paragraph of the Wichal\u0113 Treaty","volume":"5","author":"Rubenson","year":"1964","journal-title":"J Afr Hist"},{"key":"2025092301112452100_bib10","volume-title":"The Codebreakers: The Comprehensive History of Secret Communication from Ancient Times to the Internet","author":"Kahn","year":"1996"},{"key":"2025092301112452100_bib11","volume-title":"Convention: A Philosophical Study","author":"Lewis","year":"2008"},{"key":"2025092301112452100_bib12","doi-asserted-by":"publisher","first-page":"656","DOI":"10.1002\/j.1538-7305.1949.tb00928.x","article-title":"Communication theory of secrecy systems","volume":"28","author":"Shannon","year":"1949","journal-title":"Bell Syst Tech J"},{"key":"2025092301112452100_bib13","doi-asserted-by":"publisher","first-page":"147","DOI":"10.1093\/bjps\/IV.14.147","article-title":"Semantic information","volume":"4","author":"Bar-Hillel","year":"1953","journal-title":"Brit J Philos Sci"},{"key":"2025092301112452100_bib14","first-page":"161","article-title":"La cryptographie militaire","volume":"5","author":"Kerckhoffs","year":"1883","journal-title":"Journal des Sciences Militaires"},{"key":"2025092301112452100_bib15","doi-asserted-by":"crossref","DOI":"10.7551\/mitpress\/5571.001.0001","volume-title":"Privacy on the Line: The Politics of Wiretapping and Encryption","author":"Diffie","year":"1998"},{"key":"2025092301112452100_bib16","doi-asserted-by":"crossref","first-page":"184","DOI":"10.1109\/SP.1987.10001","article-title":"A comparison of commercial and military computer security policies","volume-title":"Proceedings of the 1987 IEEE Symposium on Security and Privacy","author":"Clark","year":"1987"},{"key":"2025092301112452100_bib17","first-page":"279","article-title":"Security and privacy in computer systems","volume-title":"Proceedings of the Spring Joint Computer Conference","author":"Ware","year":"1967"},{"key":"2025092301112452100_bib18","first-page":"571","article-title":"Multics: the first seven years","volume-title":"Proceedings of the Spring Joint Computer Conference","author":"Corbat\u00f3","year":"1972"},{"key":"2025092301112452100_bib19","doi-asserted-by":"crossref","DOI":"10.1002\/9781119644682","volume-title":"Security Engineering: A Guide to Building Dependable Distributed Systems","author":"Anderson","year":"2020"},{"key":"2025092301112452100_bib20","doi-asserted-by":"crossref","DOI":"10.21236\/ADA023588","article-title":"Secure computer system: unified exposition and multics interpretation","author":"Bell","year":"1976"},{"key":"2025092301112452100_bib21","article-title":"Integrity considerations for secure computer systems","author":"Biba","year":"1977"},{"key":"2025092301112452100_bib22","doi-asserted-by":"crossref","first-page":"329","DOI":"10.1109\/MARK.1979.8817256","article-title":"The foundations of a provably secure operating system (PSOS)","volume-title":"International Workshop on Managing Requirements Knowledge (MARK)","author":"Feiertag","year":"1979"},{"key":"2025092301112452100_bib23","volume-title":"Crypto: How the Code Rebels Beat the Government Saving Privacy in the Digital Age","author":"Levy","year":"2002"},{"key":"2025092301112452100_bib24","first-page":"109","article-title":"Multiuser cryptographic techniques","volume-title":"Proceedings of the National Computer Conference and Exposition","author":"Diffie","year":"1976"},{"key":"2025092301112452100_bib25","doi-asserted-by":"publisher","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","article-title":"New directions in cryptography","volume":"22","author":"Diffie","year":"1976","journal-title":"IEEE T Inform Theor"},{"key":"2025092301112452100_bib26","first-page":"449","article-title":"Why provable security matters?","volume-title":"Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT)","author":"Stern","year":"2003"},{"key":"2025092301112452100_bib27","doi-asserted-by":"publisher","first-page":"525","DOI":"10.1109\/TIT.1978.1055927","article-title":"Hiding information and signatures in trapdoor knapsacks","volume":"24","author":"Merkle","year":"1978","journal-title":"IEEE Trans Inform Theor"},{"key":"2025092301112452100_bib28","first-page":"402","article-title":"On breaking generalized knapsack public key cryptosystems","volume-title":"Proceedings of the Annual ACM Symposium on Theory of Computing","author":"Adleman","year":"1983"},{"key":"2025092301112452100_bib29","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1145\/359340.359342","article-title":"A method for obtaining digital signatures and public-key cryptosystems","volume":"21","author":"Rivest","year":"1978","journal-title":"Commun ACM"},{"key":"2025092301112452100_bib30","article-title":"Digitalized signatures and public-key functions as intractable as factorization","author":"Rabin","year":"1979"},{"key":"2025092301112452100_bib31","doi-asserted-by":"publisher","first-page":"726","DOI":"10.1109\/TIT.1980.1056264","article-title":"A modification of the RSA public-key encryption procedure","volume":"26","author":"Williams","year":"1980","journal-title":"IEEE T Inform Theor"},{"key":"2025092301112452100_bib32","first-page":"92","article-title":"Optimal asymmetric encryption","volume-title":"Proceedings of the International Conference on the Theory and Application of Cryptographic Techniques (EUROCRYPT)","author":"Bellare","year":"1995"},{"key":"2025092301112452100_bib33","first-page":"365","article-title":"Probabilistic encryption and how to play mental poker keeping secret all partial information","volume-title":"Proceedings of the Annual ACM Symposium on Theory of Computing","author":"Goldwasser","year":"1982"},{"key":"2025092301112452100_bib34","doi-asserted-by":"publisher","first-page":"270","DOI":"10.1016\/0022-0000(84)90070-9","article-title":"Probabilistic encryption","volume":"28","author":"Goldwasser","year":"1984","journal-title":"J Comput System Sci"},{"key":"2025092301112452100_bib35","doi-asserted-by":"publisher","first-page":"186","DOI":"10.1137\/0218012","article-title":"The knowledge complexity of interactive proof systems","volume":"18","author":"Goldwasser","year":"1989","journal-title":"SIAM J Comput"},{"key":"2025092301112452100_bib36","first-page":"1","article-title":"Chosen ciphertext attacks against protocols based on the RSA encryption standard PKCS# 1","volume-title":"Proceedings of the Annual International Cryptology Conference (CRYPTO)","author":"Bleichenbacher","year":"1998"},{"key":"2025092301112452100_bib37","first-page":"221","article-title":"Practice-oriented provable-security","volume-title":"International Workshop on information Security","author":"Bellare","year":"1997"},{"key":"2025092301112452100_bib38","first-page":"13","article-title":"A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack","volume-title":"Proceedings of the Annual International Cryptology Conference (CRYPTO)","author":"Cramer","year":"1998"},{"key":"2025092301112452100_bib39","first-page":"59","article-title":"Breaking RSA may not be equivalent to factoring","volume-title":"Proceedings of the International Conference on the Theory and Application of Cryptographic Techniques (EUROCRYPT)","author":"Boneh","year":"1998"},{"key":"2025092301112452100_bib40","doi-asserted-by":"crossref","first-page":"62","DOI":"10.1145\/168588.168596","article-title":"Random oracles are practical: a paradigm for designing efficient protocols","volume-title":"Proceedings of the ACM Conference on Computer and Communications Security","author":"Bellare","year":"1993"},{"key":"2025092301112452100_bib41","first-page":"256","article-title":"Lower bounds for discrete logarithms and related problems","volume-title":"Proceedings of the International Conference on the Theory and Application of Cryptographic Techniques (EUROCRYPT)","author":"Shoup","year":"1997"},{"key":"2025092301112452100_bib42","first-page":"305","article-title":"On the size of pairing-based non-interactive arguments","volume-title":"Proceedings of the Annual International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT)","author":"Groth","year":"2016"},{"key":"2025092301112452100_bib43","doi-asserted-by":"crossref","first-page":"136","DOI":"10.1109\/SFCS.2001.959888","article-title":"Universally composable security: a new paradigm for cryptographic protocols","volume-title":"Proceedings of the IEEE Symposium on Foundations of Computer Science","author":"Canetti","year":"2001"},{"key":"2025092301112452100_bib44","first-page":"1","article-title":"On the (im) possibility of obfuscating programs","volume-title":"Proceedings of the Annual International Cryptology Conference (CRYPTO)","author":"Barak","year":"2001"},{"key":"2025092301112452100_bib45","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511546891","volume-title":"Foundations of Cryptography: Volume 1 Basic Tools","author":"Goldreich","year":"2001"},{"key":"2025092301112452100_bib46","doi-asserted-by":"crossref","DOI":"10.1201\/9781420010756","volume-title":"Introduction to Modern Cryptography: Principles and Protocols","author":"Katz","year":"2007"},{"key":"2025092301112452100_bib47","doi-asserted-by":"publisher","first-page":"993","DOI":"10.1145\/359657.359659","article-title":"Using encryption for authentication in large networks of computers","volume":"21","author":"Needham","year":"1978","journal-title":"Commun ACM"},{"key":"2025092301112452100_bib48","first-page":"191","volume-title":"Kerberos: An Authentication Service for Open Network Systems","author":"Steiner","year":"1988"},{"key":"2025092301112452100_bib49","doi-asserted-by":"publisher","first-page":"533","DOI":"10.1145\/358722.358740","article-title":"Timestamps in key distribution protocols","volume":"24","author":"Denning","year":"1981","journal-title":"Commun ACM"},{"key":"2025092301112452100_bib50","doi-asserted-by":"publisher","first-page":"103","DOI":"10.1007\/s00145-001-0014-7","article-title":"Reconciling two views of cryptography (the computational soundness of formal encryption)","volume":"15","author":"Abadi","year":"2002","journal-title":"J Cryptol"},{"key":"2025092301112452100_bib51","volume-title":"An Essay in Modal Logic (Studies in Logic and the Foundations of Mathematics)","author":"von\u00a0Wright","year":"1951"},{"key":"2025092301112452100_bib52","doi-asserted-by":"publisher","first-page":"198","DOI":"10.1109\/TIT.1983.1056650","article-title":"On the security of public key protocols","volume":"29","author":"Dolev","year":"1983","journal-title":"IEEE Trans Inform Theor"},{"key":"2025092301112452100_bib53","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1145\/77648.77649","article-title":"A logic of authentication","volume":"8","author":"Burrows","year":"1990","journal-title":"ACM Trans Comput Syst"},{"key":"2025092301112452100_bib54","first-page":"147","article-title":"Breaking and fixing the Needham\u2013Schroeder public-key protocol using FDR","volume-title":"International Workshop on Tools and Algorithms for the Construction and Analysis of Systems","author":"Lowe","year":"1996"},{"key":"2025092301112452100_bib55","first-page":"14","article-title":"On unifying some cryptographic protocol logics","volume-title":"Proceedings of the IEEE Computer Society Symposium on Research in Security and Privacy","author":"Syverson","year":"1994"},{"key":"2025092301112452100_bib56","first-page":"36","article-title":"A calculus for cryptographic protocols: the spi calculus","volume-title":"Proceedings of the ACM Conference on Computer and Communications Security","author":"Abadi","year":"1997"},{"key":"2025092301112452100_bib57","first-page":"160","article-title":"Strand spaces: why is a security protocol correct?","volume-title":"Proceedings of IEEE Symposium on Security and Privacy (SP)","author":"F\u00e1brega","year":"1998"},{"key":"2025092301112452100_bib58","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1410234.1410239","article-title":"Secrecy in multiagent systems","volume":"12","author":"Halpern","year":"2008","journal-title":"ACM Trans Inf Syst Secur"},{"key":"2025092301112452100_bib59","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1016\/j.tcs.2005.03.003","article-title":"A computational interpretation of Dolev\u2013Yao adversaries","volume":"340","author":"Herzog","year":"2005","journal-title":"Theor Comput Sci"},{"key":"2025092301112452100_bib60","first-page":"82","article-title":"An efficient cryptographic protocol verifier based on prolog rules","volume-title":"IEEE Computer Security Foundations Workshop (CSFW)","author":"Blanchet","year":"2001"},{"key":"2025092301112452100_bib61","doi-asserted-by":"crossref","first-page":"162","DOI":"10.1109\/CSFW.1996.503701","article-title":"Some new attacks upon security protocols","volume-title":"Proceedings of IEEE Computer Security Foundations Workshop","author":"Lowe","year":"1996"},{"key":"2025092301112452100_bib62","first-page":"361","article-title":"Isabelle: the next 700 theorem provers","volume-title":"Logic and Computer Science","author":"Paulson","year":"1990"},{"key":"2025092301112452100_bib63","doi-asserted-by":"publisher","first-page":"332","DOI":"10.1145\/322510.322530","article-title":"Inductive analysis of the internet protocol TLS","volume":"2","author":"Paulson","year":"1999","journal-title":"ACM Trans Inform Syst Secur"},{"key":"2025092301112452100_bib64","first-page":"199","article-title":"If it\u2019s provably secure, it probably isn\u2019t: why learning from proof failure is hard","volume-title":"Cambridge International Workshop on Security Protocols","author":"Anderson","year":"2023"},{"key":"2025092301112452100_bib65","doi-asserted-by":"publisher","first-page":"223","DOI":"10.1007\/s00145-002-0133-9","article-title":"OAEP reconsidered","volume":"15","author":"Shoup","year":"2002","journal-title":"J Cryptol"},{"key":"2025092301112452100_bib66","doi-asserted-by":"publisher","first-page":"557","DOI":"10.1145\/1008731.1008734","article-title":"The random oracle methodology, revisited","volume":"51","author":"Canetti","year":"2004","journal-title":"J ACM"},{"key":"2025092301112452100_bib67","doi-asserted-by":"publisher","first-page":"781","DOI":"10.1016\/j.jnt.2009.01.006","article-title":"Elliptic curve cryptography: the serpentine course of a paradigm shift","volume":"131","author":"Koblitz","year":"2011","journal-title":"J Numb Theory"},{"key":"2025092301112452100_bib68","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1090\/S0025-5718-1987-0866109-5","article-title":"Elliptic curve cryptosystems","volume":"48","author":"Koblitz","year":"1987","journal-title":"Math Comput"},{"key":"2025092301112452100_bib69","first-page":"148","article-title":"Another look at \u201cprovable security\u201d. II","volume-title":"Proceedings of the International Conference on Cryptology in India (INDOCRYPT)","author":"Koblitz","year":"2006"},{"key":"2025092301112452100_bib70","doi-asserted-by":"publisher","first-page":"57","DOI":"10.2307\/2025976","article-title":"The four-color problem and its philosophical significance","volume":"76","author":"Tymoczko","year":"1979","journal-title":"J Philos"},{"key":"2025092301112452100_bib71","doi-asserted-by":"publisher","first-page":"205","DOI":"10.1515\/jmc-2011-0014","article-title":"Another look at automated theorem-proving II","volume":"5","author":"Koblitz","year":"2012","journal-title":"J Math Cryptol"},{"key":"2025092301112452100_bib72","first-page":"517","article-title":"Critical perspectives on provable security: fifteen years of \u201canother look\u201d papers","volume":"13","author":"Koblitz","year":"2019","journal-title":"Cryptology"},{"key":"2025092301112452100_bib73","article-title":"On post-modern cryptography","author":"Goldreich","year":"2006"},{"key":"2025092301112452100_bib74","volume-title":"Principia Mathematica","author":"Whitehead","year":"1927"},{"key":"2025092301112452100_bib75","volume-title":"Grundlagen der Mathematik","author":"Hilbert","year":"1934"},{"key":"2025092301112452100_bib76","volume-title":"Mathematische Grundlagenforschung Intuitionismus Beweistheorie","author":"Heyting","year":"1934"},{"key":"2025092301112452100_bib77","doi-asserted-by":"crossref","DOI":"10.1093\/oso\/9780198505242.001.0001","volume-title":"Elements of Intuitionism","author":"Dummett","year":"2000"},{"key":"2025092301112452100_bib78","volume-title":"Against Method: Outline of an Anarchistic Theory of Knowledge","author":"Feyerabend","year":"1978"},{"key":"2025092301112452100_bib79","volume-title":"Philosophy of Mathematics: Structure and Ontology","author":"Shapiro","year":"1997"},{"key":"2025092301112452100_bib80","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1109\/MSP.2016.122","article-title":"Practice-oriented provable security and the social construction of cryptography","volume":"14","author":"Rogaway","year":"2016","journal-title":"IEEE Secur Priv"},{"key":"2025092301112452100_bib81","volume-title":"Social Constructivism as a Philosophy of Mathematics: Radical Constructivism Rehabilitated","author":"Ernest","year":"1999"},{"key":"2025092301112452100_bib82","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9781316286425","volume-title":"Proofs and Refutations: The Logic of Mathematical Discovery","author":"Lakatos","year":"2015"},{"key":"2025092301112452100_bib83","doi-asserted-by":"publisher","first-page":"27","DOI":"10.2307\/2027085","article-title":"Real patterns","volume":"88","author":"Dennett","year":"1991","journal-title":"J Philos"},{"key":"2025092301112452100_bib84","volume-title":"Intuition Pumps and Other Tools for Thinking","author":"Dennett","year":"2013"},{"key":"2025092301112452100_bib85","doi-asserted-by":"publisher","first-page":"261","DOI":"10.1007\/s11225-010-9280-4","article-title":"Informal proofs and mathematical rigour","volume":"96","author":"Antonutti\u00a0Marfori","year":"2010","journal-title":"Studia Logica"},{"key":"2025092301112452100_bib86","doi-asserted-by":"publisher","first-page":"7377","DOI":"10.1007\/s11229-019-02524-y","article-title":"Reliability of mathematical inference","volume":"198","author":"Avigad","year":"2021","journal-title":"Synthese"},{"key":"2025092301112452100_bib87","doi-asserted-by":"crossref","first-page":"19","DOI":"10.1007\/978-94-010-2182-1_2","article-title":"Technology as applied science","volume-title":"Contributions to a Philosophy of Technology: Studies in the Structure of Thinking in the Technological Sciences","author":"Bunge","year":"1966"},{"key":"2025092301112452100_bib88","doi-asserted-by":"crossref","DOI":"10.1002\/9781118700143","volume-title":"Philosophical Engineering: Toward a Philosophy of the Web","author":"Halpin","year":"2013"},{"key":"2025092301112452100_bib89","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1145\/379486.379512","article-title":"The limits of correctness","volume":"14,15","author":"Smith","year":"1985","journal-title":"ACM Comput Soc"},{"key":"2025092301112452100_bib90","article-title":"BREACH: Reviving the CRIME attack","author":"Gluck","year":"2013"},{"key":"2025092301112452100_bib91","doi-asserted-by":"crossref","first-page":"215","DOI":"10.1145\/168588.168615","article-title":"Why cryptosystems fail","volume-title":"Proceedings of the ACM Conference on Computer and Communications Security","author":"Anderson","year":"1993"},{"key":"2025092301112452100_bib92","article-title":"The NSA is building the country\u2019s biggest spy center (watch what you say","author":"Bamford","year":"2012"},{"key":"2025092301112452100_bib93","article-title":"NSA Prism program taps into user data of Apple, Google and others","author":"Greenwald","year":"2013"},{"key":"2025092301112452100_bib94","doi-asserted-by":"publisher","first-page":"243","DOI":"10.1147\/rd.383.0243","article-title":"The Data Encryption Standard (DES) and its strength against attacks","volume":"38","author":"Coppersmith","year":"1994","journal-title":"IBM J Res Dev"},{"key":"2025092301112452100_bib95","article-title":"Attacking Tor: how the NSA targets users\u2019 online anonymity","author":"Schneier","year":"2013"},{"key":"2025092301112452100_bib96","article-title":"Revealed: how US and UK spy agencies defeat internet privacy and security","author":"Ball","year":"2013"},{"key":"2025092301112452100_bib97","doi-asserted-by":"crossref","first-page":"256","DOI":"10.1007\/978-3-662-49301-4_17","article-title":"Dual EC: a standardized back door","volume-title":"The New Codebreakers: Essays Dedicated to David Kahn on the Occasion of His 85th Birthday","author":"Bernstein","year":"2016"},{"key":"2025092301112452100_bib98","article-title":"Secret contract tied NSA and security industry pioneer","author":"Menn","year":"2013"},{"key":"2025092301112452100_bib99","article-title":"Researchers solve Juniper backdoor mystery; signs point to NSA","author":"Zetter","year":"2015"},{"key":"2025092301112452100_bib100","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/3-540-44702-4_1","article-title":"Anonymity, unobservability, and pseudonymity\u2014a proposal for terminology","volume-title":"Designing Privacy Enhancing Technologies: International Workshop on Design Issues in Anonymity and Unobservability","author":"Pfitzmann","year":"2001"},{"key":"2025092301112452100_bib101","article-title":"XKeyscore: NSA tool collects\u2019 nearly everything a user does on the internet","author":"Greenwald","year":"2013"},{"key":"2025092301112452100_bib102","first-page":"303","article-title":"Tor: The second-generation onion router","volume-title":"Proceedings of the USENIX Security Symposium","author":"Dingledine","year":"2004"},{"key":"2025092301112452100_bib103","first-page":"183","article-title":"Low-cost traffic analysis of Tor","volume-title":"Proceedings of the IEEE Symposium on Security and Privacy (SP)","author":"Murdoch","year":"2005"},{"key":"2025092301112452100_bib104","article-title":"The moral character of cryptographic work","author":"Rogaway","year":"2015","journal-title":"IACR Cryptol. ePrint Arch"},{"key":"2025092301112452100_bib105","volume-title":"The Structure of Scientific Revolutions","author":"Kuhn","year":"1962"},{"key":"2025092301112452100_bib106","doi-asserted-by":"publisher","first-page":"1914","DOI":"10.1007\/s00145-020-09360-1","article-title":"A formal security analysis of the Signal messaging protocol","volume":"33","author":"Cohn-Gordon","year":"2020","journal-title":"J Cryptol"},{"key":"2025092301112452100_bib107","first-page":"483","article-title":"Verified models and reference implementations for the TLS 1.3 standard candidate","volume-title":"Proceedings of the IEEE Symposium on Security and Privacy (SP)","author":"Bhargavan","year":"2017"},{"key":"2025092301112452100_bib108","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1561\/1000000051","article-title":"Secure processors part I: background, taxonomy for secure enclaves and Intel SGX architecture","volume":"11","author":"Costan","year":"2017","journal-title":"Found Trends Electr Des Autom"},{"key":"2025092301112452100_bib109","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1145\/2659897","article-title":"Certificate transparency","volume":"57","author":"Laurie","year":"2014","journal-title":"Commun ACM"},{"key":"2025092301112452100_bib110","first-page":"307","article-title":"Systematizing decentralization and privacy: lessons from 15 years of research and deployments","volume":"4","author":"Troncoso","year":"2017","journal-title":"Proc Priv Enhan Technol"},{"key":"2025092301112452100_bib111","first-page":"207","article-title":"Curve25519: new Diffie\u2013Hellman speed records","volume-title":"Proceedings of the International Conference on Theory and Practice in Public-Key Cryptography (PKC)","author":"Bernstein","year":"2006"},{"key":"2025092301112452100_bib112","volume-title":"Malicious Cryptography: Exposing Cryptovirology","author":"Young","year":"2004"},{"key":"2025092301112452100_bib113","first-page":"2615","article-title":"Cliptography: post-Snowden cryptography","volume-title":"Proceedings of the ACM SIGSAC Conference on Computer and Communications Security","author":"Tang","year":"2017"},{"key":"2025092301112452100_bib114","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1145\/358549.358563","article-title":"Untraceable electronic mail, return addresses, and digital pseudonyms","volume":"24","author":"Chaum","year":"1981","journal-title":"Commun ACM"},{"key":"2025092301112452100_bib115","doi-asserted-by":"crossref","first-page":"63","DOI":"10.1145\/1103576.1103585","article-title":"Provable anonymity","volume-title":"Proceedings of the ACM Workshop on Formal Methods in Security Engineering","author":"Garcia","year":"2005"},{"key":"2025092301112452100_bib116","article-title":"The Nym Network","author":"Diaz","year":"2021"},{"key":"2025092301112452100_bib117","first-page":"124","article-title":"Algorithms for quantum computation: discrete logarithms and factoring","volume-title":"Proceedings of the Annual Symposium on the Foundations of Computer Science","author":"Shor","year":"1994"},{"key":"2025092301112452100_bib118","doi-asserted-by":"publisher","first-page":"188","DOI":"10.1038\/nature23461","article-title":"Post-quantum cryptography","volume":"549","author":"Bernstein","year":"2017","journal-title":"Nature"},{"key":"2025092301112452100_bib119","doi-asserted-by":"publisher","first-page":"426","DOI":"10.1007\/BFb0015258","article-title":"Programming Satan\u2019s computer","author":"Anderson","year":"1995","journal-title":"Computer Science Today"},{"key":"2025092301112452100_bib120","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1002\/cplx.20014","article-title":"Multiscale variety in complex systems","volume":"9","author":"Bar-Yam","year":"2004","journal-title":"Complexity"},{"key":"2025092301112452100_bib121","doi-asserted-by":"publisher","first-page":"780","DOI":"10.1057\/jors.2016.37","article-title":"Contagion in cyber security attacks","volume":"68","author":"Baldwin","year":"2017","journal-title":"J Oper Res Soc"},{"key":"2025092301112452100_bib122","first-page":"338","article-title":"Traffic analysis by adversaries with partial visibility","volume-title":"Proceedings of the European Symposium on Research in Computer Security (ESORICS)","author":"Guirat","year":"2023"},{"key":"2025092301112452100_bib123","doi-asserted-by":"publisher","first-page":"483","DOI":"10.1007\/s13347-018-0312-8","article-title":"Why separation logic works","volume":"32","author":"Pym","year":"2019","journal-title":"Philos Tech"},{"key":"2025092301112452100_bib124","doi-asserted-by":"publisher","first-page":"668","DOI":"10.2307\/2026578","article-title":"Situations and attitudes","volume":"78","author":"Barwise","year":"1981","journal-title":"J Philos"},{"key":"2025092301112452100_bib125","article-title":"GCHQ taps fibre-optic cables for secret access to world\u2019s communications","author":"Nick","year":"2013"},{"key":"2025092301112452100_bib126","article-title":"The dawn of cyber-colonialism","author":"Danezis","year":"2014"},{"key":"2025092301112452100_bib127","volume-title":"Hacker, Hoaxer, Whistleblower, Spy: The Many Faces of Anonymous","author":"Coleman","year":"2015"},{"key":"2025092301112452100_bib128","doi-asserted-by":"crossref","first-page":"1","DOI":"10.55574\/VOHS5203","article-title":"The evolution of sanctions evasion: how cryptocurrency is the new game in evading sanction and how to stop it","volume":"1","author":"Wright","year":"2023","journal-title":"Int J Law Ethics Tech"},{"key":"2025092301112452100_bib129","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1103\/RevModPhys.74.47","article-title":"Statistical mechanics of complex networks","volume":"74","author":"Albert","year":"2002","journal-title":"Rev Mod Phys"},{"key":"2025092301112452100_bib130","first-page":"1","article-title":"Practicing a science of security: a philosophy of science perspective","volume-title":"Proceedings of the New Security Paradigms Workshop","author":"Spring","year":"2017"},{"key":"2025092301112452100_bib131","doi-asserted-by":"publisher","first-page":"615","DOI":"10.1007\/s11229-008-9435-2","article-title":"The philosophical novelty of computer simulation methods","volume":"169","author":"Humphreys","year":"2009","journal-title":"Synthese"},{"key":"2025092301112452100_bib132","first-page":"358","article-title":"Why information security is hard-an economic perspective","volume-title":"Proceedings of the Annual Computer Security Applications Conference","author":"Anderson","year":"2001"},{"key":"2025092301112452100_bib133","doi-asserted-by":"publisher","first-page":"7","DOI":"10.1093\/analys\/58.1.7","article-title":"The extended mind","volume":"58","author":"Clark","year":"1998","journal-title":"Analysis"},{"key":"2025092301112452100_bib134","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1080\/21507740.2022.2148772","article-title":"Data, metadata, mental data? Privacy and the extended mind","volume":"14","author":"Palermos","year":"2023","journal-title":"AJOB Neurosci"}],"container-title":["Journal of Cybersecurity"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/academic.oup.com\/cybersecurity\/article-pdf\/11\/1\/tyaf006\/62784704\/tyaf006.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/academic.oup.com\/cybersecurity\/article-pdf\/11\/1\/tyaf006\/62784704\/tyaf006.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,23]],"date-time":"2025-09-23T05:11:43Z","timestamp":1758604303000},"score":1,"resource":{"primary":{"URL":"https:\/\/academic.oup.com\/cybersecurity\/article\/doi\/10.1093\/cybsec\/tyaf006\/8097877"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":134,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2025,1,17]]}},"URL":"https:\/\/doi.org\/10.1093\/cybsec\/tyaf006","relation":{},"ISSN":["2057-2085","2057-2093"],"issn-type":[{"value":"2057-2085","type":"print"},{"value":"2057-2093","type":"electronic"}],"subject":[],"published-other":{"date-parts":[[2025]]},"published":{"date-parts":[[2025]]},"article-number":"tyaf006"}}