I\'ve implemented this algorithm from this paper [1] on Google Colab. However, even a single iteration of the attack is taking hours. So I need to adapt the algorithm so that it