Login / Signup
A Polynomial Time Attack on Instances of M-SIDH and FESTA.
Wouter Castryck
Frederik Vercauteren
Published in:
ASIACRYPT (7) (2023)
Keyphrases
</>
genetic algorithm
special case
convex quadratic optimization
evolutionary algorithm
randomly generated
neural network
simulated annealing
countermeasures
approximation algorithms
computational complexity
worst case
denial of service attacks
abstract argumentation