Login / Signup
Subvert KEM to Break DEM: Practical Algorithm-Substitution Attacks on Public-Key Encryption.
Rongmao Chen
Xinyi Huang
Moti Yung
Published in:
ASIACRYPT (2) (2020)
Keyphrases
</>
computational complexity
data streams
information extraction
tree structure