Leakage Perturbation is Not Enough: Breaking Structured Encryption Using Simulated Annealing.
Zichen GuiKenneth G. PatersonSikhar PatranabisPublished in: IACR Cryptol. ePrint Arch. (2021)
Keyphrases
- simulated annealing
- metaheuristic
- genetic algorithm
- simulated annealing algorithm
- evolutionary algorithm
- neural network
- genetic algorithm ga
- structured data
- tabu search
- real world
- combinatorial optimization
- stochastic search
- learning algorithm
- key management
- search algorithm
- information systems
- global optimum
- hill climbing
- data sets