Login / Signup
Practically-exploitable Cryptographic Vulnerabilities in Matrix.
Martin R. Albrecht
Sofía Celi
Benjamin Dowling
Daniel Jones
Published in:
SP (2023)
Keyphrases
</>
smart card
singular value decomposition
singular values
countermeasures
information security
security vulnerabilities
low rank
hash functions
linear algebra
positive definite
coefficient matrix
encryption key