Dispelling myths on superposition attacks: formal security model and attack analyses

Type
Publication
Dispelling myths on superposition attacks: formal security model and attack analyses