Login / Signup
A Simple Key Reuse Attack on LWE and Ring LWE Encryption Schemes as Key Encapsulation Mechanisms (KEMs).
Jintai Ding
Chi Cheng
Yue Qin
Published in:
IACR Cryptol. ePrint Arch. (2019)
Keyphrases
</>
databases
motion estimation