Login / Signup
Attacking and Defending Masked Polynomial Comparison for Lattice-Based Cryptography.
Shivam Bhasin
Jan-Pieter D'Anvers
Daniel Heinz
Thomas Pöppelmann
Michiel Van Beirendonck
Published in:
IACR Trans. Cryptogr. Hardw. Embed. Syst. (2021)
Keyphrases
</>
databases
cellular automata
neural network
real world
search algorithm
user interface
high level
multi agent
information security