Practically-exploitable Cryptographic Vulnerabilities in Matrix. Albrecht, M. R., Celi, S., Dowling, B., & Jones, D. IACR Cryptol. ePrint Arch., 2023. Paper bibtex @article{DBLP:journals/iacr/AlbrechtCDJ23,
author = {Martin R. Albrecht and
Sof{\'{\i}}a Celi and
Benjamin Dowling and
Daniel Jones},
title = {Practically-exploitable Cryptographic Vulnerabilities in Matrix},
journal = {{IACR} Cryptol. ePrint Arch.},
pages = {485},
year = {2023},
url = {https://eprint.iacr.org/2023/485},
timestamp = {Mon, 05 Jun 2023 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/iacr/AlbrechtCDJ23.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
Downloads: 0
{"_id":"JQkZnK9yuqx4Fj9Zn","bibbaseid":"albrecht-celi-dowling-jones-practicallyexploitablecryptographicvulnerabilitiesinmatrix-2023","author_short":["Albrecht, M. R.","Celi, S.","Dowling, B.","Jones, D."],"bibdata":{"bibtype":"article","type":"article","author":[{"firstnames":["Martin","R."],"propositions":[],"lastnames":["Albrecht"],"suffixes":[]},{"firstnames":["Sofía"],"propositions":[],"lastnames":["Celi"],"suffixes":[]},{"firstnames":["Benjamin"],"propositions":[],"lastnames":["Dowling"],"suffixes":[]},{"firstnames":["Daniel"],"propositions":[],"lastnames":["Jones"],"suffixes":[]}],"title":"Practically-exploitable Cryptographic Vulnerabilities in Matrix","journal":"IACR Cryptol. ePrint Arch.","pages":"485","year":"2023","url":"https://eprint.iacr.org/2023/485","timestamp":"Mon, 05 Jun 2023 01:00:00 +0200","biburl":"https://dblp.org/rec/journals/iacr/AlbrechtCDJ23.bib","bibsource":"dblp computer science bibliography, https://dblp.org","bibtex":"@article{DBLP:journals/iacr/AlbrechtCDJ23,\n author = {Martin R. Albrecht and\n Sof{\\'{\\i}}a Celi and\n Benjamin Dowling and\n Daniel Jones},\n title = {Practically-exploitable Cryptographic Vulnerabilities in Matrix},\n journal = {{IACR} Cryptol. ePrint Arch.},\n pages = {485},\n year = {2023},\n url = {https://eprint.iacr.org/2023/485},\n timestamp = {Mon, 05 Jun 2023 01:00:00 +0200},\n biburl = {https://dblp.org/rec/journals/iacr/AlbrechtCDJ23.bib},\n bibsource = {dblp computer science bibliography, https://dblp.org}\n}\n\n","author_short":["Albrecht, M. R.","Celi, S.","Dowling, B.","Jones, D."],"key":"DBLP:journals/iacr/AlbrechtCDJ23","id":"DBLP:journals/iacr/AlbrechtCDJ23","bibbaseid":"albrecht-celi-dowling-jones-practicallyexploitablecryptographicvulnerabilitiesinmatrix-2023","role":"author","urls":{"Paper":"https://eprint.iacr.org/2023/485"},"metadata":{"authorlinks":{}}},"bibtype":"article","biburl":"http://dblp.org/pers/tb2/a/Albrecht:Martin_R=","dataSources":["nNWn9GD9paFhQPHAh"],"keywords":[],"search_terms":["practically","exploitable","cryptographic","vulnerabilities","matrix","albrecht","celi","dowling","jones"],"title":"Practically-exploitable Cryptographic Vulnerabilities in Matrix","year":2023}