Revisiting Security Estimation for LWE with Hints from a Geometric Perspective.
Dana Dachman-SoledHuijing GongTom HansonHunter KippenPublished in: CRYPTO (5) (2022)
Keyphrases
- information security
- security issues
- computer security
- access control
- information assurance
- security analysis
- key management
- security requirements
- geometric constraints
- network security
- parameter estimation
- viewpoint
- information systems
- data mining
- data security
- security problems
- estimation algorithm
- security policies
- e government
- public key
- estimation process
- security threats
- security vulnerabilities
- neural network