Login / Signup
Subfield attack: leveraging composite-degree extensions in the Quotient Ring transform.
Pierre Pébereau
Published in:
IACR Cryptol. ePrint Arch. (2024)
Keyphrases
</>
authentication protocol
default logic
multiscale
neural network
machine intelligence
genetic algorithm
case study
database systems