The prevalence of kleptographic attacks on discrete-log based cryptosystems (original) (raw)

Lecture Notes in Computer Science, 1997

Moti Yung

Adam Young

Abstract

In particular, we employ as a discrete log based kleptogram a basic setup that was presented for the Diffie-Hellman key exchange. We show how it can be embedded in a large number of systems: the ElGamal encryption algorithm, the ElGamal signature algorithm, DSA, the ...

Moti Yung hasn't uploaded this paper.

Let Moti know you want this paper to be uploaded.

Ask for this paper to be uploaded.