Fig. 4
From: Optimizing cryptographic protocols against side channel attacks using WGAN-GP and genetic algorithms

Cryptanalysis scores of algorithms.
From: Optimizing cryptographic protocols against side channel attacks using WGAN-GP and genetic algorithms
Cryptanalysis scores of algorithms.