Login / Signup
Survey: Recovering cryptographic keys from partial information, by example.
Gabrielle De Micheli
Nadia Heninger
Published in:
IACR Commun. Cryptol. (2024)
Keyphrases
</>
partial information
hash functions
incomplete information
smart card
secret key
multiagent systems
learning algorithm
artificial intelligence
cooperative
lower bound
general purpose
similarity search
autonomous agents
search strategy
key management