A Vulnerability in Implementations of SHA-3, SHAKE, EdDSA, and Other NIST-Approved Algorithms.
Nicky MouhaChristopher CeliPublished in: CT-RSA (2023)
Keyphrases
- orders of magnitude
- data sets
- efficient implementation
- times faster
- computationally expensive
- machine learning algorithms
- theoretical analysis
- computationally efficient
- significant improvement
- data structure
- learning algorithm
- databases
- real time
- computational complexity
- computational cost
- worst case
- face recognition
- computer vision
- social networks
- computational efficiency
- recently developed