Login / Signup

Practically-exploitable Cryptographic Vulnerabilities in Matrix.

Martin R. AlbrechtSofía CeliBenjamin DowlingDaniel Jones
Published in: SP (2023)
Keyphrases
  • smart card
  • singular value decomposition
  • singular values
  • countermeasures
  • information security
  • security vulnerabilities
  • low rank
  • hash functions
  • linear algebra
  • positive definite
  • coefficient matrix
  • encryption key