1. Applebaum, B., Barak, B., Wigderson, A.: Public-key cryptography from different assumptions. In: Proceedings of the Forty-second ACM Symposium on Theory of Computing, pp. 171–180(2010)
2. Arora, S., Du, S., Hu, W., Li, Z., Wang, R.: Fine-grained analysis of optimization and generalization for overparameterized two-layer neural networks. In: International Conference on Machine Learning, pp. 322–332. PMLR (2019)
3. Abbe, E., Kamath, P., Malach, E., Sandon, C., Srebro, N.: On the power of differentiable learning versus PAC and SQ learning. Adv. Neural. Inf. Process. Syst. 34, 24340–24351 (2021)
4. Abbe, E., Sandon, C.: Poly-time universality and limitations of deep learning. arXiv preprint arXiv:2001.02992 (2020)
5. Baksi, A., Baksi, A.: Machine learning-assisted differential distinguishers for lightweight ciphers. In: Classical and Physical Security of Symmetric Key Cryptographic Algorithms, pp. 141–162(2022)