Sign in

LWE with Side Information: Attacks and Concrete Security Estimation.

Dana Dachman-SoledLéo DucasHuijing GongMélissa Rossi
Published in: CRYPTO (2) (2020)
Keyphrases
  • information flow
  • information sources
  • end users
  • information security
  • security requirements
  • unauthorized access