Complete attack on RLWE key exchange with reused keys, without signal leakage

Jintai Ding, Scott Fluhrer, Saraswathy Rv*

*Corresponding author for this work

Research output: Chapter in Book or Report/Conference proceedingConference Proceedingpeer-review

46 Citations (Scopus)

Fingerprint

Dive into the research topics of 'Complete attack on RLWE key exchange with reused keys, without signal leakage'. Together they form a unique fingerprint.

Computer Science