1 code implementation • 23 Apr 2018 • Sean Heelan, Tom Melham, Daniel Kroening
In this paper we present the first automatic approach to the problem, based on pseudo-random black-box search.
Cryptography and Security Programming Languages