Publisher
Springer Science and Business Media LLC
Subject
Computer Networks and Communications,Software
Reference36 articles.
1. Achterberg, T.: Scip: solving constraint integer programs. Math. Program. Comput. 1(1), 1–41 (2009). https://doi.org/10.1007/s12532-008-0001-1
2. Apt, K.: Principles of Constraint Programming. Cambridge University Press, Cambridge (2003). https://doi.org/10.1017/CBO9780511615320
3. Berthold, T., Heinz, S., Pfetsch, M.E.: Nonlinear Pseudo–Boolean Optimization: Relaxation or Propagation?, pp. 441–446. Springer, Berlin (2009). https://doi.org/10.1007/978-3-642-02777-2_40
4. Bockmayr, A., Hooker, J.N.: Constraint programming. Handb. Oper. Res. Manag. Sci. 12, 559–600 (2005)
5. Bogdanov, A.: Attacks on the keeloq block cipher and authentication systems. In: In RFIDSec (2007)
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Algebraic Side-Channel Attack;Encyclopedia of Cryptography, Security and Privacy;2023