Login / Signup
An IND-CCA2 Attack Against the 1st- and 2nd-round Versions of NTS-KEM.
Tung Chou
Published in:
IACR Cryptol. ePrint Arch. (2020)
Keyphrases
</>
block cipher
canonical correlation analysis
countermeasures
databases
partial least squares
attack graph
neural network
hash functions
secret key
detection mechanism