Login / Signup
A polynomial-time attack on instances of M-SIDH and FESTA.
Wouter Castryck
Frederik Vercauteren
Published in:
IACR Cryptol. ePrint Arch. (2023)
Keyphrases
</>
convex quadratic optimization
special case
countermeasures
randomly generated
detection mechanism
computational complexity
worst case
malicious users
data sets
objective function
multi class
training instances
bounded treewidth
acyclic conjunctive queries