Login / Signup
A Key-Recovery Timing Attack on Post-quantum Primitives Using the Fujisaki-Okamoto Transformation and Its Application on FrodoKEM.
Qian Guo
Thomas Johansson
Alexander Nilsson
Published in:
CRYPTO (2) (2020)
Keyphrases
</>
building blocks
artificial intelligence
high level
data sets
computer vision
knowledge base
decision trees
multi agent systems
secret key
transformation rules
image recovery
asynchronous circuits
quantum computing