Login / Signup
Equivalent public keys and a key substitution attack on the schemes from vector decomposition.
Seongan Lim
Eunjeong Lee
Cheol-Min Park
Published in:
Secur. Commun. Networks (2014)
Keyphrases
</>
key agreement
secret key
block cipher
countermeasures
decomposition method
database
data mining
feature vectors
decomposition algorithm
security properties