Login / Signup
The Last Challenge Attack: Exploiting a Vulnerable Implementation of the Fiat-Shamir Transform in a KZG-based SNARK.
Oana Ciobotaru
Maxim Peter
Vesselin Velichkov
Published in:
IACR Cryptol. ePrint Arch. (2024)
Keyphrases
</>
secret key
implementation details
neural network
countermeasures
implementation issues
learning algorithm
efficient implementation