Login / Signup
Three's Compromised Too: Circular Insecurity for Any Cycle Length from (Ring-)LWE.
Navid Alamati
Chris Peikert
Published in:
IACR Cryptol. ePrint Arch. (2016)
Keyphrases
</>
hough transform
data sets
harmonic functions
artificial neural networks
feature selection
decision making
case study
digital libraries
maximum number
fixed length