The Prevalence of Kleptographic Attacks on Discrete-Log Based Cryptosystems.
Adam L. YoungMoti YungPublished in: CRYPTO (1997)
Keyphrases
- cryptographic protocols
- countermeasures
- elliptic curve
- discrete geometry
- discrete space
- website
- malicious attacks
- continuous domains
- signature scheme
- watermarking algorithm
- log files
- security threats
- traffic analysis
- digital images
- denial of service attacks
- secret information
- neural network
- terrorist attacks
- discrete version
- malicious users