Login / Signup

Adaptive Attacks Against FESTA Without Input Validation or Constant-Time Implementation.

Tomoki MoriyaHiroshi OnukiMaozhi XuGuoqing Zhou
Published in: PQCrypto (2) (2023)
Keyphrases
  • data mining
  • countermeasures
  • databases
  • implementation details
  • data sets
  • database systems
  • lightweight
  • efficient implementation
  • implementation issues
  • traffic analysis
  • malicious attacks
  • terrorist attacks