Sign in
Integer Linear Programming for Three-Subset Meet-in-the-Middle Attacks: Application to GIFT.
Yu Sasaki
Published in:
IWSEC (2018)
Keyphrases
</>
integer linear programming
column generation
bicriteria