Scott Fluhrer edited untitled.tex  over 8 years ago

Commit id: 4bb998ba9aecf0dc84e577c0b99e7161befcdcd4

deletions | additions      

       

We query $S[i]$ for each $i$, that gives us the entire value of $S$, and the attack has succeeded.  The above would take approximately 5,000 queries (assuming that standard ring size of $N=1024$ and assuming that the value of $S$ was generated using a discrete  Gaussian Distribution with a standard distribution deviation  of circa 3). \section{Attack variants}