Inproceedings,

Subvert KEM to Break DEM: Practical Algorithm-Substitution Attacks on Public-Key Encryption.

, , and .
ASIACRYPT (2), volume 12492 of Lecture Notes in Computer Science, page 98-128. Springer, (2020)

Meta data

Tags

Users

  • @dblp

Comments and Reviews