Statements (18)
Predicate | Object |
---|---|
gptkbp:instanceOf |
gptkb:academic
|
gptkbp:appliesTo |
public key cryptography
digital signatures random number generators |
gptkbp:coinedBy |
gptkb:Adam_Young
gptkb:Moti_Yung |
gptkbp:describedBy |
gptkb:IEEE_Transactions_on_Information_Theory
|
gptkbp:field |
cryptography
|
gptkbp:firstPublished |
1996
|
gptkbp:hasApplication |
covert data exfiltration
|
https://www.w3.org/2000/01/rdf-schema#label |
kleptography
|
gptkbp:relatedTo |
gptkb:subliminal_channel
malware backdoor |
gptkbp:studies |
use of cryptography to create covert channels
use of cryptography to leak information |
gptkbp:bfsParent |
gptkb:Moti_Yung
|
gptkbp:bfsLayer |
5
|