Search Results - "Theory of computation → Computational complexity and cryptography"
-
1
Complexity Lower Bounds from Algorithm Design
Published: IEEE 29.06.2021Published in Proceedings of the 36th Annual ACM/IEEE Symposium on Logic in Computer Science (29.06.2021)“…Since the beginning of the theory of computation, researchers have been fascinated by the prospect of proving impossibility results on computing. When and how…”
Get full text
Conference Proceeding -
2
Finite Model Theory of the Triguarded Fragment and Related Logics
Published: IEEE 29.06.2021Published in Proceedings of the 36th Annual ACM/IEEE Symposium on Logic in Computer Science (29.06.2021)“…The Triguarded Fragment (TGF) is among the most expressive decidable fragments of first-order logic, subsuming both its two-variable and guarded fragments…”
Get full text
Conference Proceeding -
3
Primer: Fast Private Transformer Inference on Encrypted Data
Published: IEEE 09.07.2023Published in 2023 60th ACM/IEEE Design Automation Conference (DAC) (09.07.2023)“…It is increasingly important to enable privacy-preserving inference for cloud services based on Transformers. Post-quantum cryptographic techniques, e.g.,…”
Get full text
Conference Proceeding -
4
Optimizing windowed arithmetic for quantum attacks against RSA-2048
Published: IEEE 22.06.2025Published in 2025 62nd ACM/IEEE Design Automation Conference (DAC) (22.06.2025)“…Windowed arithmetic is a technique for reducing the cost of quantum arithmetic circuits with space-time trade-offs using memory queries to precomputed tables…”
Get full text
Conference Proceeding -
5
Towards a more efficient approach for the satisfiability of two-variable logic
Published: IEEE 29.06.2021Published in Proceedings of the 36th Annual ACM/IEEE Symposium on Logic in Computer Science (29.06.2021)“…We revisit the satisfiability problem for two-variable logic, denoted by SAT(FO 2 ), which is known to be NEXP-complete. The upper bound is usually derived…”
Get full text
Conference Proceeding -
6
CoqPilot, a plugin for LLM-based generation of proofs
ISSN: 2643-1572Published: ACM 27.10.2024Published in IEEE/ACM International Conference on Automated Software Engineering : [proceedings] (27.10.2024)“…We present CoqPilot, a VS Code extension designed to help automate writing of Coq proofs. The plugin collects the parts of proofs marked with the admit tactic…”
Get full text
Conference Proceeding -
7
ZK-Hammer: Leaking Secrets from Zero-Knowledge Proofs via Rowhammer
Published: IEEE 22.06.2025Published in 2025 62nd ACM/IEEE Design Automation Conference (DAC) (22.06.2025)“…Zero-knowledge succinct non-interactive arguments of knowledge (zk-SNARK) schemes have been a promising technique in verified computation. Zk-SNARK schemes…”
Get full text
Conference Proceeding -
8
The SIMON and SPECK lightweight block ciphers
ISSN: 0738-100XPublished: IEEE 07.06.2015Published in Proceedings - ACM IEEE Design Automation Conference (07.06.2015)“…The Simon and Speck families of block ciphers were designed specifically to offer security on constrained devices, where simplicity of design is crucial…”
Get full text
Conference Proceeding -
9
Minimal Taylor Algebras as a Common Framework for the Three Algebraic Approaches to the CSP
Published: IEEE 29.06.2021Published in Proceedings of the 36th Annual ACM/IEEE Symposium on Logic in Computer Science (29.06.2021)“…This paper focuses on the algebraic theory underlying the study of the complexity and the algorithms for the Constraint Satisfaction Problem (CSP). We unify,…”
Get full text
Conference Proceeding -
10
Accelerating All-SAT Computation with Short Blocking Clauses
ISSN: 2643-1572Published: ACM 01.09.2020Published in 2020 35th IEEE/ACM International Conference on Automated Software Engineering (ASE) (01.09.2020)“…The All-SAT (All-SATisfiable) problem focuses on finding all satisfiable assignments of a given propositional formula, whose applications include model…”
Get full text
Conference Proceeding -
11
Invited: Accelerating Fully Homomorphic Encryption with Processing in Memory
Published: IEEE 05.12.2021Published in 2021 58th ACM/IEEE Design Automation Conference (DAC) (05.12.2021)“…Fully homomorphic encryption (FHE) provides a promising solution for future computing needs by allowing privacy-preserving computation. However, its practical…”
Get full text
Conference Proceeding -
12
Categorical models of Linear Logic with fixed points of formulas
Published: IEEE 29.06.2021Published in Proceedings of the 36th Annual ACM/IEEE Symposium on Logic in Computer Science (29.06.2021)“…We develop a categorical semantics of µLL, a version of propositional Linear Logic with least and greatest fixed points extending David Baelde's propositional…”
Get full text
Conference Proceeding -
13
Combinatorial Proofs and Decomposition Theorems for First-order Logic
Published: IEEE 29.06.2021Published in Proceedings of the 36th Annual ACM/IEEE Symposium on Logic in Computer Science (29.06.2021)“…We uncover a close relationship between combinatorial and syntactic proofs for first-order logic (without equality). Whereas syntactic proofs are formalized in…”
Get full text
Conference Proceeding -
14
On the logical structure of choice and bar induction principles
Published: IEEE 29.06.2021Published in Proceedings of the 36th Annual ACM/IEEE Symposium on Logic in Computer Science (29.06.2021)“…We develop an approach to choice principles and their contrapositive bar-induction principles as extensionality schemes connecting an "intensional" or…”
Get full text
Conference Proceeding -
15
Strong Call-by-Value is Reasonable, Implosively
Published: IEEE 29.06.2021Published in Proceedings of the 36th Annual ACM/IEEE Symposium on Logic in Computer Science (29.06.2021)“…Whether the number of β -steps in the λ-calculus can be taken as a reasonable time cost model (that is, polynomially related to the one of Turing machines) is…”
Get full text
Conference Proceeding -
16
Chaff: engineering an efficient SAT solver
ISBN: 1581132972, 9781581132977ISSN: 0738-100XPublished: New York, NY, USA ACM 01.01.2001Published in Design Automation, 2001 Proceedings (01.01.2001)“…Boolean Satisfiability is probably the most studied of combinatorial optimization/search problems. Significant effort has been devoted to trying to provide…”
Get full text
Conference Proceeding -
17
Optimized Polynomial Multiplier Architectures for Post-Quantum KEM Saber
Published: IEEE 05.12.2021Published in 2021 58th ACM/IEEE Design Automation Conference (DAC) (05.12.2021)“…Saber is one of the four finalists in the ongoing NIST post-quantum cryptography standardization project. A significant portion of Saber's computation time is…”
Get full text
Conference Proceeding -
18
First-Order Reasoning and Efficient Semi-Algebraic Proofs
Published: IEEE 29.06.2021Published in Proceedings of the 36th Annual ACM/IEEE Symposium on Logic in Computer Science (29.06.2021)“…Semi-algebraic proof systems such as sum-of-squares (SoS) have attracted a lot of attention recently due to their relation to approximation algorithms [3]:…”
Get full text
Conference Proceeding -
19
Zero-one laws for provability logic: Axiomatizing validity in almost all models and almost all frames
Published: IEEE 29.06.2021Published in Proceedings of the 36th Annual ACM/IEEE Symposium on Logic in Computer Science (29.06.2021)“…It has been shown in the late 1960s that each formula of first-order logic without constants and function symbols obeys a zero-one law: As the number of…”
Get full text
Conference Proceeding -
20
zkVC: Fast Zero-Knowledge Proof for Private and Verifiable Computing
Published: IEEE 22.06.2025Published in 2025 62nd ACM/IEEE Design Automation Conference (DAC) (22.06.2025)“…In the context of cloud computing, services are held on cloud servers, where the clients send their data to the server and obtain the results returned by…”
Get full text
Conference Proceeding

