Login / Signup
An IND-CCA2 Attack Against the 1st- and 2nd-Round Versions of NTS-KEM.
Tung Chou
Published in:
SECITC (2020)
Keyphrases
</>
block cipher
canonical correlation analysis
countermeasures
secret key
detection mechanism
neural network
genetic algorithm
malicious attacks
power analysis
abstract argumentation
malicious users
relational databases
least squares
ciphertext
security vulnerabilities