Login / Signup
Caveat Implementor! Key Recovery Attacks on MEGA.
Martin R. Albrecht
Miro Haller
Lenka Mareková
Kenneth G. Paterson
Published in:
IACR Cryptol. ePrint Arch. (2023)
Keyphrases
</>
image recovery
block cipher
website
malicious attacks
recovery algorithm
neural network
search engine
web applications
database management systems
operating system
error correction
security protocols