Open Access System for Information Sharing

Login Library

 

Article
Cited 94 time in webofscience Cited 131 time in scopus
Metadata Downloads
Full metadata record
Files in This Item:
There are no files associated with this item.
DC FieldValueLanguage
dc.contributor.authorLim, CH-
dc.contributor.authorLee, PJ-
dc.date.accessioned2016-03-31T13:15:42Z-
dc.date.available2016-03-31T13:15:42Z-
dc.date.created2009-03-20-
dc.date.issued1997-01-
dc.identifier.issn0302-9743-
dc.identifier.other2001-OAK-0000002149-
dc.identifier.urihttps://oasis.postech.ac.kr/handle/2014.oak/19430-
dc.description.abstractConsider the well-known oracle attack: somehow one gets a certain computation result as a function of a secret key from the secret key owner and tries to extract some information on the secret key. This attacking scenario is well understood in the cryptographic community. However, there are many protocols based on the discrete logarithm problem that turn out to leak many of the secret key bits from this oracle attack, unless suitable checkings are carried out. In this paper we present a key recovery attack on various discrete log-based schemes working in a prime order subgroup. Our attack may reveal part of, or the whole secret key in most Diffie-Hellman-type key exchange protocols, and some applications of ElGamal encryption and signature schemes.-
dc.description.statementofresponsibilityX-
dc.languageEnglish-
dc.publisherSPRINGER-VERLAG BERLIN-
dc.relation.isPartOfLECTURE NOTES IN COMPUTER SCIENCE-
dc.subjectUNDENIABLE SIGNATURES-
dc.subjectPROTOCOLS-
dc.subjectIDENTIFICATION-
dc.subjectLOGARITHMS-
dc.subjectEXCHANGE-
dc.subjectSECRET-
dc.titleA key recovery attack on discrete log-based schemes using a prime order subgroup-
dc.typeArticle-
dc.contributor.college전자전기공학과-
dc.identifier.doi10.1007/BFb0052240-
dc.author.googleLim, CH-
dc.author.googleLee, PJ-
dc.relation.volume1294-
dc.relation.startpage249-
dc.relation.lastpage263-
dc.contributor.id10051689-
dc.relation.journalLECTURE NOTES IN COMPUTER SCIENCE-
dc.relation.indexSCI급, SCOPUS 등재논문-
dc.relation.sciSCIE-
dc.collections.nameConference Papers-
dc.type.rimsART-
dc.identifier.bibliographicCitationLECTURE NOTES IN COMPUTER SCIENCE, v.1294, pp.249 - 263-
dc.identifier.wosid000170638200017-
dc.date.tcdate2019-01-01-
dc.citation.endPage263-
dc.citation.startPage249-
dc.citation.titleLECTURE NOTES IN COMPUTER SCIENCE-
dc.citation.volume1294-
dc.contributor.affiliatedAuthorLee, PJ-
dc.identifier.scopusid2-s2.0-84958601057-
dc.description.journalClass1-
dc.description.journalClass1-
dc.description.wostc64-
dc.type.docTypeArticle; Proceedings Paper-
dc.subject.keywordPlusUNDENIABLE SIGNATURES-
dc.subject.keywordPlusPROTOCOLS-
dc.subject.keywordPlusIDENTIFICATION-
dc.subject.keywordPlusLOGARITHMS-
dc.subject.keywordPlusEXCHANGE-
dc.subject.keywordPlusSECRET-
dc.relation.journalWebOfScienceCategoryComputer Science, Theory & Methods-
dc.description.journalRegisteredClassscie-
dc.description.journalRegisteredClassscopus-
dc.relation.journalResearchAreaComputer Science-

qr_code

  • mendeley

Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher

이필중LEE, PIL JOONG
Dept of Electrical Enginrg
Read more

Views & Downloads

Browse