Login / Signup
An extension of Overbeck's attack with an application to cryptanalysis of Twisted Gabidulin-based schemes.
Alain Couvreur
Ilaria Zappatore
Published in:
IACR Cryptol. ePrint Arch. (2023)
Keyphrases
</>
secret key
block cipher
key agreement
multi agent
countermeasures
malicious attacks
window search
database
data sets
neural network
case study
scatter search