A Message Recovery Attack on LWE/LWR-Based PKE/KEMs Using Amplitude-Modulated EM Emanations.
Ruize WangKalle NgoElena DubrovaPublished in: ICISC (2022)
Keyphrases
- expectation maximization
- maximum likelihood
- recovery algorithm
- countermeasures
- em algorithm
- unsupervised learning
- image recovery
- information systems
- image segmentation
- generative model
- malicious attacks
- access control
- secret key
- information security
- gaussian mixture model
- malicious users
- message delivery
- database
- bayesian framework
- mixture model
- probabilistic model
- data mining
- data sets