Fig. 2From: Security estimation of LWE via BKW algorithmsThe core ideas of Sieve-Coded-BKW in the \(i\text {th}\) reduction stepBack to article page