A Vulnerability in Implementations of SHA-3, SHAKE, EdDSA, and Other NIST-Approved Algorithm.
Nicky MouhaChristopher CeliPublished in: IACR Cryptol. ePrint Arch. (2023)
Keyphrases
- detection algorithm
- single pass
- times faster
- expectation maximization
- computational complexity
- preprocessing
- k means
- significant improvement
- experimental evaluation
- decision trees
- optimization algorithm
- learning algorithm
- efficient implementation
- matching algorithm
- classification algorithm
- segmentation algorithm
- linear programming
- simulated annealing
- particle swarm optimization
- high accuracy
- ant colony optimization
- np hard
- evolutionary algorithm
- search space
- convex hull
- optimal solution
- selection algorithm
- estimation algorithm
- clustering algorithm