Content deleted Content added
m Added Archive link for "Noisy Diffie–Hellman Protocols" |
Citation bot (talk | contribs) Alter: title. Add: volume, chapter. | Use this bot. Report bugs. | Suggested by Whoop whoop pull up | #UCB_webform 59/895 |
||
Line 89:
== Key exchange security ==
The security of this key exchange is based on the underlying hardness of [[ring learning with errors]] problem that has been proven to be as hard as the worst case solution to the [[shortest vector problem]] (SVP) in an [[ideal lattice cryptography|ideal lattice]].<ref name=":4" /><ref name=":0" /> The best method to gauge the practical security of a given set of lattice parameters is the BKZ 2.0 lattice reduction algorithm.<ref>{{Cite book
==Implementations==
|