diff --git a/router/java/src/net/i2p/router/crypto/ElGamalAESEngine.java b/router/java/src/net/i2p/router/crypto/ElGamalAESEngine.java
index d779585f5d57e6fd92e2e7c200ff3a24b5662f7d..8c81c97cb06a7fad09a284292c865d184f38fdc7 100644
--- a/router/java/src/net/i2p/router/crypto/ElGamalAESEngine.java
+++ b/router/java/src/net/i2p/router/crypto/ElGamalAESEngine.java
@@ -120,7 +120,7 @@ public final class ElGamalAESEngine {
             if (decrypted != null) {
                 _context.statManager().updateFrequency("crypto.elGamalAES.decryptExistingSession");
                 if (!foundTags.isEmpty() && shouldDebug)
-                    _log.debug("ElG/AES decrypt success with " + st + ": found tags: " + foundTags);
+                    _log.debug("ElG/AES decrypt success with " + st + ": found tags: " + foundTags.size());
                 wasExisting = true;
             } else {
                 _context.statManager().updateFrequency("crypto.elGamalAES.decryptFailed");
@@ -133,7 +133,7 @@ public final class ElGamalAESEngine {
             if (decrypted != null) {
                 _context.statManager().updateFrequency("crypto.elGamalAES.decryptNewSession");
                 if (!foundTags.isEmpty() && shouldDebug)
-                    _log.debug("ElG decrypt success: found tags: " + foundTags);
+                    _log.debug("ElG decrypt success: found tags: " + foundTags.size());
             } else {
                 _context.statManager().updateFrequency("crypto.elGamalAES.decryptFailed");
                 if (_log.shouldLog(Log.WARN))
@@ -189,15 +189,15 @@ public final class ElGamalAESEngine {
         if (decrypted != null) {
             _context.statManager().updateFrequency("crypto.elGamalAES.decryptExistingSession");
             if (!foundTags.isEmpty() && shouldDebug)
-                _log.debug("ElG/AES decrypt success with " + st + ": found tags: " + foundTags);
+                _log.debug("ElG/AES decrypt success with " + st + ": found tags: " + foundTags.size());
             if (!foundTags.isEmpty()) {
                 if (foundKey.getData() != null) {
                     if (shouldDebug) 
-                        _log.debug("Found key: " + foundKey.toBase64() + " tags: " + foundTags + " in existing session");
+                        _log.debug("Found key: " + foundKey.toBase64() + " in existing session");
                     keyManager.tagsReceived(foundKey, foundTags);
                 } else if (usedKey.getData() != null) {
                     if (shouldDebug) 
-                        _log.debug("Used key: " + usedKey.toBase64() + " tags: " + foundTags + " in existing session");
+                        _log.debug("Used key: " + usedKey.toBase64() + " in existing session");
                     keyManager.tagsReceived(usedKey, foundTags);
                 }
             }
@@ -236,14 +236,14 @@ public final class ElGamalAESEngine {
         }
         if (!foundTags.isEmpty()) {
             if (shouldDebug)
-                _log.debug("ElG decrypt success: found tags: " + foundTags);
+                _log.debug("ElG decrypt success: found tags: " + foundTags.size());
             if (foundKey.getData() != null) {
                 if (shouldDebug) 
-                    _log.debug("Found key: " + foundKey.toBase64() + " tags: " + foundTags + " in new session");
+                    _log.debug("Found key: " + foundKey.toBase64() + " in new session");
                 keyManager.tagsReceived(foundKey, foundTags);
             } else if (usedKey.getData() != null) {
                 if (shouldDebug) 
-                    _log.debug("Used key: " + usedKey.toBase64() + " tags: " + foundTags + " in new session");
+                    _log.debug("Used key: " + usedKey.toBase64() + " in new session");
                 keyManager.tagsReceived(usedKey, foundTags);
             }
         }