Correction to: ``Dispelling myths on superposition attacks: formal security model and attack analyses
From MaRDI portal
Publication:2672307
Recommendations
- Dispelling myths on superposition attacks: formal security model and attack analyses
- Dispelling myths on superposition attacks: formal security model and attack analyses
- Superposition attacks on cryptographic protocols
- Correction to: ``Unconditionally secure computation against low-complexity leakage
- Correction to: ``Unconditionally secure computation against low-complexity leakage
- Experimental verification of super-Sbox analysis -- confirmation of detailed attack complexity
This page was built for publication: Correction to: ``Dispelling myths on superposition attacks: formal security model and attack analyses
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2672307)