Software implementations of discrete logarithm based cryptosystems over finite fields typically make the assumption that any domain parameters they encounter define cyclic groups for which the discrete logarithm problem is assumed to be hard.
Articles About Vulnerabilities
-
Indiscreet Logs: Diffie-Hellman Backdoors in TLS
Aleksander Essex February 27, 2017
Categories: Crypto TLS Vulnerabilities Papers