Asymptotics of hybrid primal lattice attacks.
Daniel J. BernsteinPublished in: IACR Cryptol. ePrint Arch. (2023)
Keyphrases
- countermeasures
- linear programming
- markov chain
- linear program
- security mechanisms
- support vector
- primal dual
- sufficient conditions
- neural network
- affine scaling
- malicious attacks
- lattice structure
- data sets
- least squares
- watermarking algorithm
- np hard
- optimal solution
- objective function
- algebraic structure
- feature selection
- malicious users
- chosen plaintext