no code implementations • 7 Mar 2023 • Cathy Li, Jana Sotáková, Emily Wenger, Mohamed Malhou, Evrard Garcelon, Francois Charton, Kristin Lauter
However, this attack assumes access to millions of eavesdropped LWE samples and fails at higher Hamming weights or dimensions.