{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,18]],"date-time":"2025-12-18T14:06:18Z","timestamp":1766066778828,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":29,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,10,30]],"date-time":"2017-10-30T00:00:00Z","timestamp":1509321600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,10,30]]},"DOI":"10.1145\/3133956.3133981","type":"proceedings-article","created":{"date-parts":[[2017,10,27]],"date-time":"2017-10-27T12:48:18Z","timestamp":1509108498000},"page":"1649-1660","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":32,"title":["Algorithm Substitution Attacks from a Steganographic Perspective"],"prefix":"10.1145","author":[{"given":"Sebastian","family":"Berndt","sequence":"first","affiliation":[{"name":"University of L\u00fcbeck, L\u00fcbeck, Germany"}]},{"given":"Maciej","family":"Li\u015bkiewicz","sequence":"additional","affiliation":[{"name":"University of L\u00fcbeck, L\u00fcbeck, Germany"}]}],"member":"320","published-online":{"date-parts":[[2017,10,30]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-61996-8_30"},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813635"},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30576-7_12"},{"key":"e_1_3_2_2_4_1","volume-title":"Revealed: how US and UK spy agencies defeat internet privacy and security. The Guardian","author":"Ball James","year":"2013","unstructured":"James Ball, Julian Borger, Glenn Greenwald, and others. 2013. Revealed: how US and UK spy agencies defeat internet privacy and security. The Guardian Vol. 6 (2013)."},{"volume-title":"A Concrete Security Treatment of Symmetric Encryption Proc","author":"Bellare Mihir","key":"e_1_3_2_2_5_1","unstructured":"Mihir Bellare, Anand Desai, E. Jokipii, and Phillip Rogaway 1997. A Concrete Security Treatment of Symmetric Encryption Proc. FOCS. IEEE Computer Society, 394--403. Full version available under http:\/\/web.cs.ucdavis.edu\/ rogaway\/papers\/sym-enc.pdf."},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813681"},{"key":"e_1_3_2_2_7_1","volume-title":"CRYPTO 2014 (Lecture Notes in Computer Science)","volume":"8616","author":"Bellare Mihir","year":"2014","unstructured":"Mihir Bellare, Kenneth G. Paterson, and Phillip Rogaway. 2014. Security of Symmetric Encryption against Mass Surveillance Proc. CRYPTO 2014 (Lecture Notes in Computer Science), Vol. Vol. 8616. 1--19."},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"crossref","unstructured":"Mihir Bellare and Phillip Rogaway 1993. Random Oracles are Practical: A Paradigm for Designing Efficient Protocols Proc. CCS. ACM 62--73.","DOI":"10.1145\/168588.168596"},{"key":"e_1_3_2_2_9_1","volume-title":"Proc. ISAAC (LIPIcs)","volume":"64","author":"Berndt Sebastian","year":"2016","unstructured":"Sebastian Berndt and Maciej Li'skiewicz 2016. Hard Communication Channels for Steganography. In Proc. ISAAC (LIPIcs), Vol. Vol. 64. Schloss Dagstuhl - Leibniz-Zentrum fuer Informatik, 16:1--16:13."},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ic.2004.02.003"},{"key":"e_1_3_2_2_11_1","volume-title":"On the Practical Exploitability of Dual EC in TLS Implementations Proc. USENIX. USENIX Association, 319--335","author":"Checkoway Stephen","year":"2014","unstructured":"Stephen Checkoway, Ruben Niederhagen, Adam Everspaugh, Matthew Green, Tanja Lange, Thomas Ristenpart, Daniel J. Bernstein, Jake Maskiewicz, Hovav Shacham, and Matthew Fredrikson. 2014. On the Practical Exploitability of Dual EC in TLS Implementations Proc. USENIX. USENIX Association, 319--335."},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-008-9020-3"},{"volume-title":"A More Cautious Approach to Security Against Mass Surveillance Proc. FSE (Lecture Notes in Computer Science)","author":"Degabriele Jean Paul","key":"e_1_3_2_2_13_1","unstructured":"Jean Paul Degabriele, Pooya Farshim, and Bertram Poettering. 2015. A More Cautious Approach to Security Against Mass Surveillance Proc. FSE (Lecture Notes in Computer Science), Vol. Vol. 9054. Springer, 579--598."},{"volume-title":"No place to hide: Edward Snowden, the NSA, and the US surveillance state","author":"Greenwald Glenn","key":"e_1_3_2_2_14_1","unstructured":"Glenn Greenwald. 2014. No place to hide: Edward Snowden, the NSA, and the US surveillance state. Macmillan."},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45708-9_6"},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2008.199"},{"volume-title":"Introduction to Modern Cryptography","author":"Katz Jonathan","key":"e_1_3_2_2_17_1","unstructured":"Jonathan Katz and Yehuda Lindell 2007. Introduction to Modern Cryptography. Chapman and Hall\/CRC Press."},{"key":"e_1_3_2_2_18_1","volume-title":"Petitcolas","author":"Katzenbeisser Stefan","year":"2002","unstructured":"Stefan Katzenbeisser and Fabien A.P. Petitcolas 2002. Defining security in steganographic systems. In Proc. Electronic Imaging. SPIE, 50--56."},{"volume-title":"Probability and computing - randomized algorithms and probabilistic analysis","author":"Mitzenmacher Michael","key":"e_1_3_2_2_19_1","unstructured":"Michael Mitzenmacher and Eli Upfal 2005. Probability and computing - randomized algorithms and probabilistic analysis. Cambridge University Press. newpage"},{"key":"e_1_3_2_2_20_1","volume-title":"NSA able to foil basic safeguards of privacy on web. The New York Times","author":"Perlroth Nicole","year":"2013","unstructured":"Nicole Perlroth, Jeff Larson, and Scott Shane. 2013. NSA able to foil basic safeguards of privacy on web. The New York Times Vol. 5 (2013)."},{"volume-title":"Cliptography: Clipping the Power of Kleptographic Attacks Proc. ASIACRYPT (Lecture Notes in Computer Science)","author":"Russell Alexander","key":"e_1_3_2_2_21_1","unstructured":"Alexander Russell, Qiang Tang, Moti Yung, and Hong-Sheng Zhou 2016. Cliptography: Clipping the Power of Kleptographic Attacks Proc. ASIACRYPT (Lecture Notes in Computer Science), Vol. Vol. 10032. Springer, 34--64."},{"key":"e_1_3_2_2_22_1","first-page":"530","article-title":"Destroying Steganography via Amalgamation: Kleptographically CPA Secure Public Key Encryption","volume":"2016","author":"Russell Alexander","year":"2016","unstructured":"Alexander Russell, Qiang Tang, Moti Yung, and Hong-Sheng Zhou. 2016. Destroying Steganography via Amalgamation: Kleptographically CPA Secure Public Key Encryption. IACR Cryptology ePrint Archive Vol. 2016 (2016), 530.","journal-title":"IACR Cryptology ePrint Archive"},{"key":"e_1_3_2_2_23_1","unstructured":"Bruce Schneier. 2007. Did NSA put a secret backdoor in new encryption standard? http:\/\/www.wired.com\/politics\/security\/commentary\/securitymatters\/2007\/11\/securitymatters. (2007)."},{"key":"e_1_3_2_2_24_1","first-page":"97","article-title":". Surreptitiously Weakening Cryptographic Systems","volume":"2015","author":"Schneier Bruce","year":"2015","unstructured":"Bruce Schneier, Matthew Fredrikson, Tadayoshi Kohno, and Thomas Ristenpart 2015. Surreptitiously Weakening Cryptographic Systems. IACR Cryptology ePrint Archive Vol. 2015 (2015), 97.","journal-title":"IACR Cryptology ePrint Archive"},{"key":"e_1_3_2_2_25_1","unstructured":"Dan Shumow and Niels Ferguson 2007. On the Possibility of a Back Door in the NIST SP800-90 Dual Ec Prng. Presentation at the CRYPTO 2007 Rump Session. (2007)."},{"volume-title":"The prisoners' problem and the subliminal channel Proc","author":"Simmons Gustavus J","key":"e_1_3_2_2_26_1","unstructured":"Gustavus J Simmons. 1984. The prisoners' problem and the subliminal channel Proc. CRYPTO. Springer, 51--67."},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/49.668969"},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-68697-5_8"},{"volume-title":"Kleptography: Using cryptography against cryptography Proc. EUROCRYPT (Lecture Notes in Computer Science)","author":"Young Adam","key":"e_1_3_2_2_29_1","unstructured":"Adam Young and Moti Yung 1997. Kleptography: Using cryptography against cryptography Proc. EUROCRYPT (Lecture Notes in Computer Science), Vol. Vol. 1233. Springer, 62--74."}],"event":{"name":"CCS '17: 2017 ACM SIGSAC Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Dallas Texas USA","acronym":"CCS '17"},"container-title":["Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3133956.3133981","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3133956.3133981","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:13:26Z","timestamp":1750212806000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3133956.3133981"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,10,30]]},"references-count":29,"alternative-id":["10.1145\/3133956.3133981","10.1145\/3133956"],"URL":"https:\/\/doi.org\/10.1145\/3133956.3133981","relation":{},"subject":[],"published":{"date-parts":[[2017,10,30]]},"assertion":[{"value":"2017-10-30","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}