Sign in
Subvert KEM to Break DEM: Practical Algorithm-Substitution Attacks on Public-Key Encryption.
Rongmao Chen
Xinyi Huang
Moti Yung
Published in:
IACR Cryptol. ePrint Arch. (2020)
Keyphrases
</>
computational complexity
databases
tree structure
data access