Login / Signup
Cold Boot Attacks on Ring and Module LWE Keys Under the NTT.
Martin R. Albrecht
Amit Deo
Kenneth G. Paterson
Published in:
IACR Trans. Cryptogr. Hardw. Embed. Syst. (2018)
Keyphrases
</>
countermeasures
traffic analysis
malicious attacks
image watermarking
denial of service attacks
malicious users
information systems
watermarking algorithm
computer security
terrorist attacks
data sets
watermarking scheme
security protocols
arbitrary length