Practical algorithm substitution attack on extractable signatures.
Yi ZhaoKaitai LiangYanqi ZhaoBo YangYang MingEmmanouil PanaousisPublished in: Des. Codes Cryptogr. (2022)
Keyphrases
- learning algorithm
- matching algorithm
- computational cost
- experimental evaluation
- times faster
- computational complexity
- linear programming
- optimal solution
- preprocessing
- search space
- np hard
- data sets
- dynamic programming
- classification algorithm
- detection algorithm
- worst case
- optimization algorithm
- memory requirements
- selection algorithm
- improved algorithm
- input data
- k means
- similarity measure
- neural network
- particle swarm optimization
- computationally efficient
- high accuracy
- clustering method
- tree structure
- objective function
- path planning
- reinforcement learning
- decision trees