A Key Recovery Attack on Discrete Log-based Schemes Using a Prime Order Subgroupp

@inproceedings{Lim1997AKR,
  title={A Key Recovery Attack on Discrete Log-based Schemes Using a Prime Order Subgroupp},
  author={Chae Hoon Lim and Pil Joong Lee},
  booktitle={CRYPTO},
  year={1997}
}
Consider the well-known oracle attack: somehow one gets a certain computation result as a function of a secret key from the secret key owner and tries to extract some information on the secret key. This attacking scenario is well understood in the cryptographic community. However, there are many protocols based on the discrete logarithm problem that turn out to leak many of the secret key bits from this oracle attack, unless suitable checkings are carried out. In this paper we present a key… CONTINUE READING
Highly Influential
This paper has highly influenced 14 other papers. REVIEW HIGHLY INFLUENTIAL CITATIONS

Citations

Publications citing this paper.
Showing 1-10 of 112 extracted citations

References

Publications referenced by this paper.
Showing 1-4 of 4 references

On Di e-Hellman key agreement with short exponents

  • P.C.van Oorschot, M.J.Wiener
  • Advances in Cryptology - EUROCRYPT'96,
  • 1996
Highly Influential
5 Excerpts

P.van Oorschot and M.Wiener, Authentication and authenticated key exchange, Designs

  • W.Di e
  • Codes and Cryptography,
  • 1992
Highly Influential
3 Excerpts

Breaking an e cient anonymous channel, In Advances in Cryptology - EURO- CRYPT'94

  • B. P tzmann
  • LNCS 950,
  • 1995
1 Excerpt

Similar Papers

Loading similar papers…