Statements (18)
| Predicate | Object |
|---|---|
| gptkbp:instanceOf |
gptkb:academic
|
| gptkbp:appliesTo |
public key cryptography
digital signatures random number generators |
| gptkbp:coinedBy |
gptkb:Adam_Young
gptkb:Moti_Yung |
| gptkbp:describedBy |
gptkb:IEEE_Transactions_on_Information_Theory
|
| gptkbp:field |
cryptography
|
| gptkbp:firstPublished |
1996
|
| gptkbp:hasApplication |
covert data exfiltration
|
| gptkbp:relatedTo |
gptkb:subliminal_channel
gptkb:malware backdoor |
| gptkbp:studies |
use of cryptography to create covert channels
use of cryptography to leak information |
| gptkbp:bfsParent |
gptkb:Moti_Yung
|
| gptkbp:bfsLayer |
5
|
| https://www.w3.org/2000/01/rdf-schema#label |
kleptography
|