Subliminal Hash Channels

2Citations
Citations of this article
9Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Due to their nature, subliminal channels are mostly regarded as being malicious, but due to recent legislation efforts users’ perception might change. Such channels can be used to subvert digital signature protocols without degrading the security of the underlying primitive. Thus, it is natural to find countermeasures and devise subliminal-free signatures. In this paper we discuss state-of-the-art countermeasures and introduce a generic method to bypass them.

Cite

CITATION STYLE

APA

Teşeleanu, G. (2019). Subliminal Hash Channels. In Communications in Computer and Information Science (Vol. 1133 CCIS, pp. 149–165). Springer. https://doi.org/10.1007/978-3-030-36237-9_9

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free