Sign in

Integer Linear Programming for Three-Subset Meet-in-the-Middle Attacks: Application to GIFT.

Yu Sasaki
Published in: IWSEC (2018)
Keyphrases
  • integer linear programming
  • column generation
  • bicriteria