Login / Signup
On the Timing Leakage of the Deterministic Re-encryption in HQC KEM.
Clemens Hlauschek
Norman Lahr
Robin Leander Schröder
Published in:
IACR Cryptol. ePrint Arch. (2021)
Keyphrases
</>
data cube
encryption scheme
encryption algorithms
database
data warehouse
standard model
ciphertext
image encryption
relaxation algorithm
high dimensional
xml documents
nearest neighbor
digital libraries
information hiding
image authentication
randomized algorithms
databases