Login / Signup
Recovering cryptographic keys from partial information, by example.
Gabrielle De Micheli
Nadia Heninger
Published in:
IACR Cryptol. ePrint Arch. (2020)
Keyphrases
</>
partial information
hash functions
incomplete information
smart card
secret key
key management
similarity search
sensing actions
security protocols
search algorithm
cellular automata
autonomous agents