{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,8]],"date-time":"2026-03-08T21:05:10Z","timestamp":1773003910388,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":15,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,10,30]],"date-time":"2017-10-30T00:00:00Z","timestamp":1509321600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,10,30]]},"DOI":"10.1145\/3133956.3136065","type":"proceedings-article","created":{"date-parts":[[2017,10,27]],"date-time":"2017-10-27T12:48:18Z","timestamp":1509108498000},"page":"2615-2616","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":21,"title":["Cliptography"],"prefix":"10.1145","author":[{"given":"Qiang","family":"Tang","sequence":"first","affiliation":[{"name":"New Jersey Institute of Technology, Newark, NJ, USA"}]},{"given":"Moti","family":"Yung","sequence":"additional","affiliation":[{"name":"Snap Inc. &amp; Columbia University, New York City, NY, USA"}]}],"member":"320","published-online":{"date-parts":[[2017,10,30]]},"reference":[{"key":"e_1_3_2_2_1_1","volume-title":"Mass-surveillance without the State: Strongly Undetectable Algorithm-Substitution Attacks ACM CCS 15, bibfieldeditor","author":"Bellare Mihir","unstructured":"Mihir Bellare, Joseph Jaeger, and Daniel Kane. 2015. Mass-surveillance without the State: Strongly Undetectable Algorithm-Substitution Attacks ACM CCS 15, bibfieldeditorIndrajit Ray, Ninghui Li, and Christopher Kruegel: (Eds.). ACM Press, 1431--1440."},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/978--3--662--44371--2_1"},{"key":"e_1_3_2_2_3_1","volume-title":"A Systematic Analysis of the Juniper Dual EC Incident Proceedings of ACM CCS","author":"Checkoway Stephen","year":"2016","unstructured":"Stephen Checkoway, Shaanan Cohney, Christina Garman, Matthew Green, Nadia Heninger, Jacob Maskiewicz, Eric Rescorla, Hovav Shacham, and Ralf-Philipp Weinmann 2016. A Systematic Analysis of the Juniper Dual EC Incident Proceedings of ACM CCS 2016. shownoteFull version available at http:\/\/eprint.iacr.org\/2016\/376."},{"key":"e_1_3_2_2_4_1","volume-title":"On the Practical Exploitability of Dual EC in TLS Implementations Proceedings of the 23rd USENIX Security Symposium","author":"Checkoway Stephen","year":"2014","unstructured":"Stephen Checkoway, Ruben Niederhagen, Adam Everspaugh, Matthew Green, Tanja Lange, Thomas Ristenpart, Daniel J. Bernstein, Jake Maskiewicz, Hovav Shacham, and Matthew Fredrikson. 2014. On the Practical Exploitability of Dual EC in TLS Implementations Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20--22, 2014. 319--335."},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/978--3--662--53018--4_15"},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/978--3--662--53018--4_13"},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45708-9_6"},{"key":"e_1_3_2_2_8_1","volume-title":"Revealed: The NSA's secret campaign to crack, undermine internet security. Pro-Publica.","author":"Larson Jeff","year":"2013","unstructured":"Jeff Larson, Nicole Perlroth, and Scott Shane. 2013. Revealed: The NSA's secret campaign to crack, undermine internet security. Pro-Publica. (2013). shownotehttp:\/\/www.propublica.org\/article\/the-nsas-secret-campaign-to-crack-undermine-internet-encryption."},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/978--3--662--46803--6_22"},{"key":"e_1_3_2_2_10_1","unstructured":"Nicole Perlroth Jeff Larson and Scott Shane. 2013. N.S.A. able to foil basic safeguards of privacy on web. The New York Times. (2013). shownotehttp:\/\/www.nytimes.com\/2013\/09\/06\/us\/nsa-foils-much-internet-encryption.html."},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/978--3--662--53890--6_2"},{"key":"e_1_3_2_2_12_1","volume-title":"Generic Semantic Security against a Kleptographic Adversary Proceedings of the 24nd ACM SIGSAC Conference on Computer and Communications Security","author":"Russell Alexander","year":"2017","unstructured":"Alexander Russell, Qiang Tang, Moti Yung, and Hong-Sheng Zhou. 2017. Generic Semantic Security against a Kleptographic Adversary Proceedings of the 24nd ACM SIGSAC Conference on Computer and Communications Security, Dallas, TX, USA, October 30-November 4, 2017."},{"key":"e_1_3_2_2_13_1","volume-title":"The Dark Side of \"Black-Box\" Cryptography, or: Should We Trust Capstone? CRYPTO'96 (LNCS), bibfieldeditor","author":"Young Adam","unstructured":"Adam Young and Moti Yung 1996. The Dark Side of \"Black-Box\" Cryptography, or: Should We Trust Capstone? CRYPTO'96 (LNCS), bibfieldeditorNeal Koblitz (Ed.), Vol. Vol. 1109. Springer, Heidelberg, 89--103."},{"key":"e_1_3_2_2_14_1","volume-title":"Kleptography: Using Cryptography Against Cryptography EUROCRYPT'97 (LNCS), bibfieldeditor","author":"Young Adam","unstructured":"Adam Young and Moti Yung 1997. Kleptography: Using Cryptography Against Cryptography EUROCRYPT'97 (LNCS), bibfieldeditorWalter Fumy (Ed.), Vol. Vol. 1233. Springer, Heidelberg, 62--74."},{"key":"e_1_3_2_2_15_1","volume-title":"Secret Code Found in Juniper's Firewalls Shows Risk of Government Backdoors. (December","author":"Zetter Kim","year":"2015","unstructured":"Kim Zetter. 2015. Secret Code Found in Juniper's Firewalls Shows Risk of Government Backdoors. (December 2015). endthebibliography"}],"event":{"name":"CCS '17: 2017 ACM SIGSAC Conference on Computer and Communications Security","location":"Dallas Texas USA","acronym":"CCS '17","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3133956.3136065","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3133956.3136065","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:11:03Z","timestamp":1750212663000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3133956.3136065"}},"subtitle":["Post-Snowden Cryptography"],"short-title":[],"issued":{"date-parts":[[2017,10,30]]},"references-count":15,"alternative-id":["10.1145\/3133956.3136065","10.1145\/3133956"],"URL":"https:\/\/doi.org\/10.1145\/3133956.3136065","relation":{},"subject":[],"published":{"date-parts":[[2017,10,30]]},"assertion":[{"value":"2017-10-30","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}