Login / Signup
Adaptive Attacks Against FESTA Without Input Validation or Constant-Time Implementation.
Tomoki Moriya
Hiroshi Onuki
Maozhi Xu
Guoqing Zhou
Published in:
PQCrypto (2) (2023)
Keyphrases
</>
data mining
countermeasures
databases
implementation details
data sets
database systems
lightweight
efficient implementation
implementation issues
traffic analysis
malicious attacks
terrorist attacks