Sign in

Subvert KEM to Break DEM: Practical Algorithm-Substitution Attacks on Public-Key Encryption.

Rongmao ChenXinyi HuangMoti Yung
Published in: ASIACRYPT (2) (2020)
Keyphrases
  • computational complexity
  • data streams
  • information extraction
  • tree structure