. Consider the well-known oracle attack: somehow one gets a certain computation result as a function of a secret key from the secret key owner and tries to extract some information on the secret key. This attacking scenario is well understood in the cryptographic community. However, there are many protocols based on the discrete logarithm problem that turn out to leak many of the secret key bits from this oracle attack, unless suitable checkings are carried out. In this paper we present a key recovery attack on various discrete log-based schemes working in a prime order subgroup. Our attack may reveal part of, or the whole secret key in most Diffie-Hellman-type key exchange protocols and some applications of ElGamal encryption and signature...
We present variants of the signature schemes of GuillouQuisquater ElGamal and Schnorr whose securi...
We introduce novel security proofs that use combinatorial counting arguments rather than reductions ...
In 2008, Doliskani et al. proposed an ElGamal-style encryption scheme using the symmetric group Sn a...
Abstract. We describe new attacks that can be launched on some well known signature schemes. The att...
Over the last year or two, a large number of attacks have been found by the authors and others on pr...
Abstract — Three-party authenticated key exchange protocol is an important cryptographic technique i...
Due to the intractability of the Discrete Logarithm Problem (DLP), it has been widely used in the fi...
A subgroup G_q, of prime order q, for which the discrete logarithm problem is assumed hard is mostly...
Nyberg and Rueppel recently proposed a new ElGamal-type digital signature scheme with message recove...
This article belongs to the Special Issue Public Key Cryptography.In 2008, Doliskani et al. proposed...
This paper begins by describing basic properties of finite field and elliptic curve cryptography ove...
In this chapter we introduce the basic building blocks for cryptography based on the discrete logari...
[[abstract]]Public key cryptosystems are proposed to protect users'security of communications over t...
Taher Elgamal rst described the ElGamal Cryptosystem [6] in an article published in the proceedings ...
Both uniform and non-uniform results concerning the security of the Diffie-Hellman key-exchange prot...
We present variants of the signature schemes of GuillouQuisquater ElGamal and Schnorr whose securi...
We introduce novel security proofs that use combinatorial counting arguments rather than reductions ...
In 2008, Doliskani et al. proposed an ElGamal-style encryption scheme using the symmetric group Sn a...
Abstract. We describe new attacks that can be launched on some well known signature schemes. The att...
Over the last year or two, a large number of attacks have been found by the authors and others on pr...
Abstract — Three-party authenticated key exchange protocol is an important cryptographic technique i...
Due to the intractability of the Discrete Logarithm Problem (DLP), it has been widely used in the fi...
A subgroup G_q, of prime order q, for which the discrete logarithm problem is assumed hard is mostly...
Nyberg and Rueppel recently proposed a new ElGamal-type digital signature scheme with message recove...
This article belongs to the Special Issue Public Key Cryptography.In 2008, Doliskani et al. proposed...
This paper begins by describing basic properties of finite field and elliptic curve cryptography ove...
In this chapter we introduce the basic building blocks for cryptography based on the discrete logari...
[[abstract]]Public key cryptosystems are proposed to protect users'security of communications over t...
Taher Elgamal rst described the ElGamal Cryptosystem [6] in an article published in the proceedings ...
Both uniform and non-uniform results concerning the security of the Diffie-Hellman key-exchange prot...
We present variants of the signature schemes of GuillouQuisquater ElGamal and Schnorr whose securi...
We introduce novel security proofs that use combinatorial counting arguments rather than reductions ...
In 2008, Doliskani et al. proposed an ElGamal-style encryption scheme using the symmetric group Sn a...