Login / Signup
Better Key Sizes (and Attacks) for LWE-Based Encryption.
Richard Lindner
Chris Peikert
Published in:
CT-RSA (2011)
Keyphrases
</>
block cipher
data encryption standard
high security
secure communication
security protocols
cryptographic protocols
key management
security properties
cryptographic algorithms
private key
encryption algorithms
neural network
countermeasures
security analysis
security threats