Sign in

Attacking and Defending Masked Polynomial Comparison for Lattice-Based Cryptography.

Shivam BhasinJan-Pieter D'AnversDaniel HeinzThomas PöppelmannMichiel Van Beirendonck
Published in: IACR Trans. Cryptogr. Hardw. Embed. Syst. (2021)
Keyphrases
  • databases
  • cellular automata
  • neural network
  • real world
  • search algorithm
  • user interface
  • high level
  • multi agent
  • information security