Improving the MILP-based Security Evaluation Algorithms against Differential Cryptanalysis Using Divide-and-Conquer Approach.
Chunning ZhouWentao ZhangTianyou DingZejun XiangPublished in: IACR Cryptol. ePrint Arch. (2019)
Keyphrases
- computational cost
- learning algorithm
- significant improvement
- theoretical analysis
- orders of magnitude
- times faster
- resource constrained project scheduling problem
- machine learning
- database systems
- worst case
- optimization problems
- data mining techniques
- computationally efficient
- machine learning algorithms
- evaluation metrics
- approximate solutions