Login / Signup
LWE with Side Information: Attacks and Concrete Security Estimation.
Dana Dachman-Soled
Léo Ducas
Huijing Gong
Mélissa Rossi
Published in:
IACR Cryptol. ePrint Arch. (2020)
Keyphrases
</>
information sources
end users
information extraction
social networks
information flow
privacy concerns
unauthorized access