Algorithm 2
From: Optimizing cryptographic protocols against side channel attacks using WGAN-GP and genetic algorithms

WGAN-GP training procedure
From: Optimizing cryptographic protocols against side channel attacks using WGAN-GP and genetic algorithms
WGAN-GP training procedure