A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2010; you can also visit the original URL.
The file type is application/pdf
.
Strong Adaptive Chosen-Ciphertext Attacks with Memory Dump (or: The Importance of the Order of Decryption and Validation)
[chapter]
2001
Lecture Notes in Computer Science
This paper presents a new type of powerful cryptanalytic attacks on public-key cryptosystems, extending the more commonly studied adaptive chosen-ciphertext attacks. In the new attacks, an adversary is not only allowed to submit to a decryption oracle (valid or invalid) ciphertexts of her choice, but also to emit a "dump query" prior to the completion of a decryption operation. The dump query returns intermediate results that have not been erased in the course of the decryption operation,
doi:10.1007/3-540-45325-3_11
fatcat:k4vlq5w4dbgixgte4unuknx3my