The security of Lizard is based on an n-dimensional LWE problem (secret key recovery) and an m-dimensional LWR problem (ephemeral secrets). At the moment, only the LWR problem is considered in the estimates, but attacking the secret key may be easier.
The security of Lizard is based on an n-dimensional LWE problem (secret key recovery) and an m-dimensional LWR problem (ephemeral secrets). At the moment, only the LWR problem is considered in the estimates, but attacking the secret key may be easier.