Login / Signup
Reducing an LWE Instance by Modular Hints and its Applications to Primal Attack, Dual Attack and BKW Attack.
Han Wu
Xiaoyun Wang
Guangwu Xu
Published in:
IACR Cryptol. ePrint Arch. (2022)
Keyphrases
</>
countermeasures
malicious users
least squares
secret key
cyber attacks
attack graph
attack graphs
data mining
case study
support vector
dos attacks
denial of service attacks
malicious attacks
security vulnerabilities