Login / Signup
Better Key Sizes (and Attacks) for LWE-Based Encryption.
Richard Lindner
Chris Peikert
Published in:
IACR Cryptol. ePrint Arch. (2010)
Keyphrases
</>
block cipher
high security
watermarking scheme
countermeasures
stream cipher
neural network
data mining
wireless sensor networks
digital images
secret key
private key
secure communication
digital watermark
protection schemes
data encryption standard