Login / Signup

Improved Attacks on LowMC with Algebraic Techniques.

Yimeng SunJiamin CuiMeiqin Wang
Published in: IACR Trans. Symmetric Cryptol. (2023)
Keyphrases
  • countermeasures
  • security protocols
  • databases
  • genetic algorithm
  • information systems
  • higher order
  • malicious users