Skip to main content
Fig. 5 | Cybersecurity

Fig. 5

From: Hybrid dual attack on LWE with arbitrary secrets

Fig. 5

Comparison between LAC192 (left) and Dilithium768 (right). Figures in the first row plot \(T_{\mathrm{\textsc {Hybrid 2}}}\), \(T_{\mathrm{BKZ}}\), and \(p_c\) in function of r; Figures in the second row visualize the impact of centralization level over \(p_c\)

Back to article page