Login / Signup
How to backdoor LWE-like cryptosystems.
Tobias Hemmert
Published in:
IACR Cryptol. ePrint Arch. (2022)
Keyphrases
</>
elliptic curve
secret key
cryptographic protocols
signature scheme
public key cryptosystems
key distribution
standard model
private key
fuzzy vault
data sets
machine learning
artificial intelligence
information systems
search algorithm