A Key Recovery Attack on Discrete Log-based Schemes Using a Prime Order Subgroupp

  title={A Key Recovery Attack on Discrete Log-based Schemes Using a Prime Order Subgroupp},
  author={Chae Hoon Lim and Pil Joong Lee},
Consider the well-known oracle attack: somehow one gets a certain computation result as a function of a secret key from the secret key owner and tries to extract some information on the secret key. This attacking scenario is well understood in the cryptographic community. However, there are many protocols based on the discrete logarithm problem that turn out to leak many of the secret key bits from this oracle attack, unless suitable checkings are carried out. In this paper we present a key… CONTINUE READING
Highly Influential
This paper has highly influenced 14 other papers. REVIEW HIGHLY INFLUENTIAL CITATIONS


Publications citing this paper.
Showing 1-10 of 112 extracted citations


Publications referenced by this paper.
Showing 1-4 of 4 references

On Di e-Hellman key agreement with short exponents

  • P.C.van Oorschot, M.J.Wiener
  • Advances in Cryptology - EUROCRYPT'96,
  • 1996
Highly Influential
5 Excerpts

P.van Oorschot and M.Wiener, Authentication and authenticated key exchange, Designs

  • W.Di e
  • Codes and Cryptography,
  • 1992
Highly Influential
3 Excerpts

Breaking an e cient anonymous channel, In Advances in Cryptology - EURO- CRYPT'94

  • B. P tzmann
  • LNCS 950,
  • 1995
1 Excerpt

Similar Papers

Loading similar papers…