Dispelling myths on superposition attacks: formal security model and attack analyses

Publication
Dispelling myths on superposition attacks: formal security model and attack analyses