Fig. 4From: Security estimation of LWE via BKW algorithmsA comparison of different types of Coded-BKW combined with sievingBack to article page