The prevalence of kleptographic attacks on discrete-log based cryptosystems (original) (raw)
Lecture Notes in Computer Science, 1997
Adam Young
Abstract
In particular, we employ as a discrete log based kleptogram a basic setup that was presented for the Diffie-Hellman key exchange. We show how it can be embedded in a large number of systems: the ElGamal encryption algorithm, the ElGamal signature algorithm, DSA, the ...
Moti Yung hasn't uploaded this paper.
Create a free Academia account to let Moti Yung know you want this paper to be uploaded.
Ask for this paper to be uploaded.