Fig. 5
From: Optimizing cryptographic protocols against side channel attacks using WGAN-GP and genetic algorithms

Fitness scores of different algorithms.
From: Optimizing cryptographic protocols against side channel attacks using WGAN-GP and genetic algorithms
Fitness scores of different algorithms.