Login / Signup
Vulnerability - Information Leakage of Reused Secret Key in NewHope.
Routo Terada
Reynaldo Cáceres Villena
Published in:
IEICE Trans. Fundam. Electron. Commun. Comput. Sci. (2022)
Keyphrases
</>
secret key
information leakage
secret information
secret data
personal information
smart card
authentication scheme
pseudorandom
public key
encryption scheme
sensitive information
key management
authentication protocol
nearest neighbor
image quality
digital signature