Login / Signup

Algebraic Meet-in-the-Middle Attack on LowMC.

Fukang LiuSantanu SarkarGaoli WangWilli MeierTakanori Isobe
Published in: ASIACRYPT (1) (2022)
Keyphrases
  • countermeasures
  • data mining
  • learning algorithm
  • detection mechanism
  • database
  • computer vision
  • bayesian networks
  • encryption algorithm
  • abstract argumentation
  • attack graphs