Login / Signup

Parallelizing the Hybrid Lattice-Reduction and Meet-in-the-Middle Attack.

Thomas WundererMichael BurgerGiang Nam Nguyen
Published in: CSE (2018)
Keyphrases
  • information systems
  • countermeasures
  • reduction method
  • detection mechanism
  • access control
  • hybrid learning
  • secret key
  • lattice structure
  • malicious attacks
  • hybrid approaches
  • key exchange protocol