Login / Signup
Parallelizing the Hybrid Lattice-Reduction and Meet-in-the-Middle Attack.
Thomas Wunderer
Michael Burger
Giang Nam Nguyen
Published in:
CSE (2018)
Keyphrases
</>
information systems
countermeasures
reduction method
detection mechanism
access control
hybrid learning
secret key
lattice structure
malicious attacks
hybrid approaches
key exchange protocol