Login / Signup
A Trace Map Attack Against Special Ring-LWE Samples.
Yasuhiko Ikematsu
Satoshi Nakamura
Masaya Yasuda
Published in:
IWSEC (2021)
Keyphrases
</>
maximum a posteriori
countermeasures
data sets
training samples
neural network
learning algorithm
training set
data samples
detection mechanism
attack detection
data corruption
key exchange protocol