@inproceedings{e9413308148f4ccbb29d31c60ee7ecee,
title = "Strong adaptive chosen-ciphertext attacks with memory dump (or: The importance of the order of decryption and validation)",
abstract = "This paper presents a new type of powerful cryptanalytic attacks on public-key cryptosystems, extending the more commonly studied adaptive chosen-ciphertext attacks. In the new attacks, an adversary is not only allowed to submit to a decryption oracle (valid or invalid) ciphertexts of her choice, but also to emit a “dump query” prior to the completion of a decryption operation. The dump query returns intermediate results that have not been erased in the course of the decryption operation, whereby allowing the adversary to gain vital advantages in breaking the cryptosystem. We believe that the new attack model approximates more closely existing security systems. We examine its power by demonstrating that most existing public-key cryptosystems, including OAEP-RSA, are vulnerable to our extended attacks.",
keywords = "Chosen-ciphertext security, Ciphertext validity, ElGamal encryption, Encryption, OAEP-RSA, Provable security",
author = "Seungjoo Kim and Cheon, {Jung Hee} and Marc Joye and Seongan Lim and Masahiro Mambo and Dongho Won and Yuliang Zheng",
note = "Publisher Copyright: {\textcopyright} Springer-Verlag Berlin Heidelberg 2001.; 8th IMA International Conference on Cryptography and Coding, 2001 ; Conference date: 17-12-2001 Through 19-12-2001",
year = "2001",
doi = "10.1007/3-540-45325-3_11",
language = "English",
isbn = "3540430261",
series = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",
publisher = "Springer Verlag",
pages = "114--127",
editor = "Bahram Honary and Bahram Honary",
booktitle = "Cryptography and Coding - 8th IMA International Conference, Proceedings",
}