Login / Signup
Practically-exploitable Cryptographic Vulnerabilities in Matrix.
Martin R. Albrecht
Sofía Celi
Benjamin Dowling
Daniel Jones
Published in:
IACR Cryptol. ePrint Arch. (2023)
Keyphrases
</>
smart card
information security
data sets
singular value decomposition
hash functions
key management
linear algebra
digital signature
covariance matrix
security issues
security mechanisms
security vulnerabilities
positive definite
security protocols
low rank
markov chain
information systems