Login / Signup
Superposition Attacks on Pseudorandom Schemes based on Two or Less Permutations.
Shaoxuan Zhang
Chun Guo
Qingju Wang
Published in:
IACR Cryptol. ePrint Arch. (2022)
Keyphrases
</>
pseudorandom
stream cipher
random number
uniformly distributed
secret key
random numbers
countermeasures
real time
theorem proving
cryptographic algorithms
database systems
feature extraction
security risks
malicious attacks
chosen plaintext