Login / Signup
Improving the MILP-based Security Evaluation Algorithms against Differential Cryptanalysis Using Divide-and-Conquer Approach.
Chunning Zhou
Wentao Zhang
Tianyou Ding
Zejun Xiang
Published in:
IACR Cryptol. ePrint Arch. (2019)
Keyphrases
</>
computational cost
learning algorithm
significant improvement
theoretical analysis
orders of magnitude
times faster
resource constrained project scheduling problem
machine learning
database systems
worst case
optimization problems
data mining techniques
computationally efficient
machine learning algorithms
evaluation metrics
approximate solutions