Statements (21)
| Predicate | Object |
|---|---|
| gptkbp:instanceOf |
gptkb:academic
|
| gptkbp:application |
public-key cryptography
asymmetric cryptography |
| gptkbp:focusesOn |
use of cryptography for malicious purposes
|
| gptkbp:introduced |
gptkb:Moti_Yung
gptkb:Adam_L._Young |
| gptkbp:introducedIn |
1996
|
| gptkbp:notableExample |
gptkb:cryptoviral_extortion
gptkb:malware cryptotrojan |
| gptkbp:relatedTo |
computer security
cryptography information security |
| gptkbp:studies |
gptkb:malware
covert communication information hiding cryptographic attacks deniable communication |
| gptkbp:bfsParent |
gptkb:Moti_Yung
|
| gptkbp:bfsLayer |
5
|
| https://www.w3.org/2000/01/rdf-schema#label |
cryptovirology
|