Research Article

Fuzzy Matching Template Attacks on Multivariate Cryptography: A Case Study

Figure 2

Serial implementation of QUAD (2, 160, 160) [18].