It is the area that employs public key cryptography to mount attacks on computer systems, showing that cryptography has also "negative" usage. It started in a 96 paper by Young and Yung in IEEE Security and Privacy. Ransomeware employed in actual attacks on systems that do not have recent backups is an instance of this area of study.