Abstract: The Snowden incident illustrates that an adversary may launch an algorithm substitution attack (ASA) by tampering with the algorithms of protocol participants to obtain users’ secret ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results