Fig. 3From: Security estimation of LWE via BKW algorithmsA comprehensive comparison of sample reduction of different BKW algorithmsBack to article page