Research Article

Fuzzy Matching Template Attacks on Multivariate Cryptography: A Case Study

Figure 3

Parallel implementation of QUAD (2, 160, 160) [19].