Sign in

A Trace Map Attack Against Special Ring-LWE Samples.

Yasuhiko IkematsuSatoshi NakamuraMasaya Yasuda
Published in: IWSEC (2021)
Keyphrases
  • maximum a posteriori
  • countermeasures
  • data sets
  • training samples
  • neural network
  • learning algorithm
  • training set
  • data samples
  • detection mechanism
  • attack detection
  • data corruption
  • key exchange protocol