Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 225,851,522 papers from all fields of science
Search
Sign In
Create Free Account
Cryptovirology
Known as:
Cryptovirus
, Cryptovirus group
Cryptovirology is a field that studies how to use cryptography to design powerful malicious software. The field was born with the observation that…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
18 relations
Antivirus software
Backdoor (computing)
Computer virus
CryptoLocker
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
Dynamic ransomware protection using deterministic random bit generator
Haeun Kim
,
Dongchang Yoo
,
Ju-Sung Kang
,
Yongjin Yeom
IEEE Conference on Application, Information and…
2017
Corpus ID: 9851572
Ransomware has become a very significant cyber threat. The basic idea of ransomware was presented in the form of a cryptovirus in…
Expand
2017
2017
Ransomware: The CryptoVirus subverting cloud security
S. Bhattacharya
,
C R S Kumar
International Conference on Algorithms…
2017
Corpus ID: 43768934
Cloud computing presents unlimited prospects for Information Technology (IT) industry and business enterprises alike. Rapid…
Expand
2017
2017
On Ransomware and Envisioning the Enemy of Tomorrow
Adam L. Young
,
M. Yung
Computer
2017
Corpus ID: 32268327
We warned the public more than 20 years ago that cryptoviral extortion would pose a major threat to users, a threat that has been…
Expand
2016
2016
Special issues of Convergence in Computing Ransomware : A Cyber Extortion Miss
Harsh Salvi
2016
Corpus ID: 58890048
Life as we know it today would be hampered without computers. They controls just about everything from basic communication…
Expand
2016
2016
Cryptoviral Extortion: Evolution, Scenarios, and Analysis
Bharti Nagpal
,
Vinayak Wadhwa
2016
Corpus ID: 62960240
“Cryptography” is a blessing to cyber security. People can store information securely and communicate privately over long…
Expand
Review
2012
Review
2012
A Review Report on Cryptovirology and Cryptography
Shafiqul Abidin
,
Rajeev Kumar
,
V. Tiwari
2012
Corpus ID: 16667004
— Cryptography has traditionally been used for defensive purposes. Ciphers defend against a passive eavesdropper. Public key…
Expand
2006
2006
Chapter 10: An Elliptic Curve Asymmetric Backdoor in OpenSSL RSA Key Generation
Adam L. Young
,
M. Yung
2006
Corpus ID: 16565666
In this chapter we present an experimental implementation of an asymmetric backdoor in RSA key generation. The implementation is…
Expand
2005
2005
Building a Cryptovirus Using Microsoft's Cryptographic API
Adam L. Young
Information Security Conference
2005
Corpus ID: 39879858
This paper presents the experimental results that were obtained by implementing the payload of a cryptovirus on the Microsoft…
Expand
2003
2003
Non-zero sum games and survivable malware
Adam L. Young
IEEE Systems, Man and Cybernetics…
2003
Corpus ID: 5122676
There has been much recent work in the area of beneficial mobile agents and malicious mobile agents such as cryptoviruses. We…
Expand
1990
1990
Molecular characterization of alfalfa cryptic virus 1
G. Accotto
,
C. Marzachì
,
E. Luisoni
,
R. Milne
1990
Corpus ID: 55184362
Alfalfa cryptic virus 1 (ACV1) was purified from alfalfa plant clone (Medicago sativa) and characterized. The genome of ACV 1…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE