The prevalence of kleptographic attacks on discrete-log based cryptosystems (original) (raw)
Lecture Notes in Computer Science, 1997
Adam Young
Abstract
In particular, we employ as a discrete log based kleptogram a basic setup that was presented for the Diffie-Hellman key exchange. We show how it can be embedded in a large number of systems: the ElGamal encryption algorithm, the ElGamal signature algorithm, DSA, the ...
Moti Yung hasn't uploaded this paper.
Let Moti know you want this paper to be uploaded.
Ask for this paper to be uploaded.