Login / Signup
Is ML-Based Cryptanalysis Inherently Limited? Simulating Cryptographic Adversaries via Gradient-Based Methods.
Avital Shafran
Eran Malach
Thomas Ristenpart
Gil Segev
Stefano Tessaro
Published in:
IACR Cryptol. ePrint Arch. (2024)
Keyphrases
</>
feature extraction
preprocessing
significant improvement
qualitative and quantitative
real time
databases
artificial intelligence
optimal solution
active learning
computational cost
machine learning methods
search methods