Login / Signup
LWE with Side Information: Attacks and Concrete Security Estimation.
Dana Dachman-Soled
Léo Ducas
Huijing Gong
Mélissa Rossi
Published in:
CRYPTO (2) (2020)
Keyphrases
</>
information flow
information sources
end users
information security
security requirements
unauthorized access