The prevalence of kleptographic attacks on discrete-log based cryptosystems (original) (raw)

Lecture Notes in Computer Science, 1997

Moti Yung

Adam Young

Abstract

In particular, we employ as a discrete log based kleptogram a basic setup that was presented for the Diffie-Hellman key exchange. We show how it can be embedded in a large number of systems: the ElGamal encryption algorithm, the ElGamal signature algorithm, DSA, the ...

Moti Yung hasn't uploaded this paper.

Create a free Academia account to let Moti Yung know you want this paper to be uploaded.

Ask for this paper to be uploaded.