Search Results - "Theory of computation → Computational complexity and cryptography"

Refine Results
  1. 1

    Complexity Lower Bounds from Algorithm Design by Williams, R. Ryan

    Published: IEEE 29.06.2021
    “…Since the beginning of the theory of computation, researchers have been fascinated by the prospect of proving impossibility results on computing. When and how…”
    Get full text
    Conference Proceeding
  2. 2

    Finite Model Theory of the Triguarded Fragment and Related Logics by Kieronski, Emanuel, Rudolph, Sebastian

    Published: IEEE 29.06.2021
    “…The Triguarded Fragment (TGF) is among the most expressive decidable fragments of first-order logic, subsuming both its two-variable and guarded fragments…”
    Get full text
    Conference Proceeding
  3. 3

    Primer: Fast Private Transformer Inference on Encrypted Data by Zheng, Mengxin, Lou, Qian, Jiang, Lei

    Published: IEEE 09.07.2023
    “…It is increasingly important to enable privacy-preserving inference for cloud services based on Transformers. Post-quantum cryptographic techniques, e.g.,…”
    Get full text
    Conference Proceeding
  4. 4

    Optimizing windowed arithmetic for quantum attacks against RSA-2048 by Luongo, Alessandro, Narasimhachar, Varun, Sireesh, Adithya

    Published: IEEE 22.06.2025
    “…Windowed arithmetic is a technique for reducing the cost of quantum arithmetic circuits with space-time trade-offs using memory queries to precomputed tables…”
    Get full text
    Conference Proceeding
  5. 5

    Towards a more efficient approach for the satisfiability of two-variable logic by Lin, Ting-Wei, Lu, Chia-Hsuan, Tan, Tony

    Published: IEEE 29.06.2021
    “…We revisit the satisfiability problem for two-variable logic, denoted by SAT(FO 2 ), which is known to be NEXP-complete. The upper bound is usually derived…”
    Get full text
    Conference Proceeding
  6. 6

    CoqPilot, a plugin for LLM-based generation of proofs by Kozyrev, Andrei, Solovev, Gleb, Khramov, Nikita, Podkopaev, Anton

    ISSN: 2643-1572
    Published: ACM 27.10.2024
    “…We present CoqPilot, a VS Code extension designed to help automate writing of Coq proofs. The plugin collects the parts of proofs marked with the admit tactic…”
    Get full text
    Conference Proceeding
  7. 7

    ZK-Hammer: Leaking Secrets from Zero-Knowledge Proofs via Rowhammer by Liang, Junkai, Zhang, Xin, Hu, Daqi, Shen, Qingni, Fang, Yuejian, Wu, Zhonghai

    Published: IEEE 22.06.2025
    “…Zero-knowledge succinct non-interactive arguments of knowledge (zk-SNARK) schemes have been a promising technique in verified computation. Zk-SNARK schemes…”
    Get full text
    Conference Proceeding
  8. 8

    The SIMON and SPECK lightweight block ciphers by Beaulieu, Ray, Treatman-Clark, Stefan, Shors, Douglas, Weeks, Bryan, Smith, Jason, Wingers, Louis

    ISSN: 0738-100X
    Published: IEEE 07.06.2015
    “…The Simon and Speck families of block ciphers were designed specifically to offer security on constrained devices, where simplicity of design is crucial…”
    Get full text
    Conference Proceeding
  9. 9

    Minimal Taylor Algebras as a Common Framework for the Three Algebraic Approaches to the CSP by Barto, Libor, Brady, Zarathustra, Bulatov, Andrei, Kozik, Marcin, Zhuk, Dmitriy

    Published: IEEE 29.06.2021
    “…This paper focuses on the algebraic theory underlying the study of the complexity and the algorithms for the Constraint Satisfaction Problem (CSP). We unify,…”
    Get full text
    Conference Proceeding
  10. 10

    Accelerating All-SAT Computation with Short Blocking Clauses by Zhang, Yueling, Pu, Geguang, Sun, Jun

    ISSN: 2643-1572
    Published: ACM 01.09.2020
    “…The All-SAT (All-SATisfiable) problem focuses on finding all satisfiable assignments of a given propositional formula, whose applications include model…”
    Get full text
    Conference Proceeding
  11. 11

    Invited: Accelerating Fully Homomorphic Encryption with Processing in Memory by Gupta, Saransh, Rosing, Tajana Simunic

    Published: IEEE 05.12.2021
    “…Fully homomorphic encryption (FHE) provides a promising solution for future computing needs by allowing privacy-preserving computation. However, its practical…”
    Get full text
    Conference Proceeding
  12. 12

    Categorical models of Linear Logic with fixed points of formulas by Ehrhard, Thomas, Jafarrahmani, Farzad

    Published: IEEE 29.06.2021
    “…We develop a categorical semantics of µLL, a version of propositional Linear Logic with least and greatest fixed points extending David Baelde's propositional…”
    Get full text
    Conference Proceeding
  13. 13

    Combinatorial Proofs and Decomposition Theorems for First-order Logic by Hughes, Dominic J. D., Strasburger, Lutz, Wu, Jui-Hsuan

    Published: IEEE 29.06.2021
    “…We uncover a close relationship between combinatorial and syntactic proofs for first-order logic (without equality). Whereas syntactic proofs are formalized in…”
    Get full text
    Conference Proceeding
  14. 14

    On the logical structure of choice and bar induction principles by Brede, Nuria, Herbelin, Hugo

    Published: IEEE 29.06.2021
    “…We develop an approach to choice principles and their contrapositive bar-induction principles as extensionality schemes connecting an "intensional" or…”
    Get full text
    Conference Proceeding
  15. 15

    Strong Call-by-Value is Reasonable, Implosively by Accattoli, Beniamino, Condoluci, Andrea, Coen, Claudio Sacerdoti

    Published: IEEE 29.06.2021
    “…Whether the number of β -steps in the λ-calculus can be taken as a reasonable time cost model (that is, polynomially related to the one of Turing machines) is…”
    Get full text
    Conference Proceeding
  16. 16

    Chaff: engineering an efficient SAT solver by Moskewicz, Matthew W., Madigan, Conor F., Zhao, Ying, Zhang, Lintao, Malik, Sharad

    ISBN: 1581132972, 9781581132977
    ISSN: 0738-100X
    Published: New York, NY, USA ACM 01.01.2001
    Published in Design Automation, 2001 Proceedings (01.01.2001)
    “…Boolean Satisfiability is probably the most studied of combinatorial optimization/search problems. Significant effort has been devoted to trying to provide…”
    Get full text
    Conference Proceeding
  17. 17

    Optimized Polynomial Multiplier Architectures for Post-Quantum KEM Saber by Basso, Andrea, Roy, Sujoy Sinha

    Published: IEEE 05.12.2021
    “…Saber is one of the four finalists in the ongoing NIST post-quantum cryptography standardization project. A significant portion of Saber's computation time is…”
    Get full text
    Conference Proceeding
  18. 18

    First-Order Reasoning and Efficient Semi-Algebraic Proofs by Part, Fedor, Thapen, Neil, Tzameret, Iddo

    Published: IEEE 29.06.2021
    “…Semi-algebraic proof systems such as sum-of-squares (SoS) have attracted a lot of attention recently due to their relation to approximation algorithms [3]:…”
    Get full text
    Conference Proceeding
  19. 19

    Zero-one laws for provability logic: Axiomatizing validity in almost all models and almost all frames by Verbrugge, Rineke

    Published: IEEE 29.06.2021
    “…It has been shown in the late 1960s that each formula of first-order logic without constants and function symbols obeys a zero-one law: As the number of…”
    Get full text
    Conference Proceeding
  20. 20

    zkVC: Fast Zero-Knowledge Proof for Private and Verifiable Computing by Zhang, Yancheng, Zheng, Mengxin, Chen, Xun, Hu, Jingtong, Shi, Weidong, Ju, Lei, Solihin, Yan, Lou, Qian

    Published: IEEE 22.06.2025
    “…In the context of cloud computing, services are held on cloud servers, where the clients send their data to the server and obtain the results returned by…”
    Get full text
    Conference Proceeding