Suchergebnisse - (( Key yorks. boolean function complexity ) OR ( key work. boolean function complexity ))*

Andere Suchmöglichkeiten:

  1. 1

    A Grover-Meets-Simon Approach to Match Vector Boolean Functions von Venere, Marco, Barenghi, Alessandro, Pelosi, Gerardo

    ISSN: 2689-1808, 2689-1808
    Veröffentlicht: New York IEEE 2025
    Veröffentlicht in IEEE transactions on quantum engineering (2025)
    “… The Boolean matching problem via NP-equivalence requires determining whether two Boolean functions are equivalent or not up to a permutation and negation of the input binary variables …”
    Volltext
    Journal Article
  2. 2

    Algebraic immunity for cryptographically significant Boolean functions: analysis and construction von Carlet, C., Dalai, D.K., Gupta, K.C., Maitra, S.

    ISSN: 0018-9448, 1557-9654
    Veröffentlicht: New York, NY IEEE 01.07.2006
    Veröffentlicht in IEEE transactions on information theory (01.07.2006)
    “… It has been observed that a Boolean function f used as a cryptographic primitive, and interpreted as a multivariate polynomial over F/sub 2/, should not have low degree multiples obtained …”
    Volltext
    Journal Article
  3. 3

    SMC: Satisfiability Modulo Convex Programming von Shoukry, Yasser, Nuzzo, Pierluigi, Sangiovanni-Vincentelli, Alberto L., Seshia, Sanjit A., Pappas, George J., Tabuada, Paulo

    ISSN: 0018-9219, 1558-2256
    Veröffentlicht: New York IEEE 01.09.2018
    Veröffentlicht in Proceedings of the IEEE (01.09.2018)
    “… Boolean methods such as satisfiability (SAT) solving are successful in tackling large combinatorial search problems for the design and verification of hardware and software components …”
    Volltext
    Journal Article
  4. 4

    New Techniques for Proving Fine-Grained Average-Case Hardness von Dalirrooyfard, Mina, Lincoln, Andrea, Williams, Virginia Vassilevska

    ISSN: 2575-8454
    Veröffentlicht: IEEE 01.11.2020
    “… The recent emergence of fine-grained cryptography strongly motivates developing an average-case analogue of Fine-Grained Complexity (FGC). Prior work …”
    Volltext
    Tagungsbericht
  5. 5

    A Boolean Network Approach to Estrogen Transcriptional Regulation von Hernández-Lemus, Enrique, Sandoval-Motta, Santiago, Espinal-Enríquez, Jesús, Anda-Jáuregui, Guillermo de

    ISSN: 1076-2787, 1099-0526
    Veröffentlicht: Cairo, Egypt Hindawi Publishing Corporation 01.01.2019
    Veröffentlicht in Complexity (New York, N.Y.) (01.01.2019)
    “… Estrogen is a sex hormone known for its roles in cell proliferation. Its expression has been involved in several physiological functions such as regulating the menstrual and reproduction cycles in women …”
    Volltext
    Journal Article
  6. 6

    STRAUSS: Spectral Transform Use in Stochastic Circuit Synthesis von Alaghi, Armin, Hayes, John P.

    ISSN: 0278-0070, 1937-4151
    Veröffentlicht: New York IEEE 01.11.2015
    “… Its key advantages are low-complexity hardware and high-error tolerance. SC has recently been finding application in several important areas, including image processing, artificial neural networks, and low-density parity check decoding …”
    Volltext
    Journal Article
  7. 7

    Improved Bounds for Wireless Localization von Christ, Tobias, Hoffmann, Michael, Okamoto, Yoshio, Uno, Takeaki

    ISSN: 0178-4617, 1432-0541
    Veröffentlicht: New York Springer-Verlag 01.07.2010
    Veröffentlicht in Algorithmica (01.07.2010)
    “… In other words, the interior of the polygon must be described by a monotone Boolean formula composed from the keys …”
    Volltext
    Journal Article Tagungsbericht
  8. 8

    Perfect Tabular Hashing in Pseudolinear Time von Palit, Shekhar, Wortman, Kevin A.

    Veröffentlicht: IEEE 27.01.2021
    “… We present an algorithm for generating perfect tabulation hashing functions by reduction to Boolean satisfaction (SAT …”
    Volltext
    Tagungsbericht
  9. 9

    On the sample complexity of linear code equivalence for all code rates von Budroni, Alessandro, Natale, Andrea

    ISSN: 1936-2447, 1936-2455
    Veröffentlicht: New York Springer US 01.07.2025
    Veröffentlicht in Cryptography and communications (01.07.2025)
    “… In this work, we generalize the proposed attacks to cover all code rates. We show that the complexity …”
    Volltext
    Journal Article
  10. 10

    Exploiting symmetry in SAT-based boolean matching for heterogeneous FPGA technology mapping von Yu Hu, Shih, V., Majumdar, R., Lei He

    ISBN: 1424413818, 9781424413812
    ISSN: 1092-3152
    Veröffentlicht: IEEE 01.11.2007
    “… The Boolean matching problem is a key procedure in technology mapping for heterogeneous field programmable gate arrays (FPGA …”
    Volltext
    Tagungsbericht
  11. 11

    Success probability of multiple/multidimensional linear cryptanalysis under general key randomisation hypotheses von Samajder, Subhabrata, Sarkar, Palash

    ISSN: 1936-2447, 1936-2455
    Veröffentlicht: New York Springer US 01.09.2018
    Veröffentlicht in Cryptography and communications (01.09.2018)
    “… Expressions for the success probability in terms of the data complexity and the advantage are obtained using the general key randomisation hypotheses for both multidimensional and multiple linear …”
    Volltext
    Journal Article
  12. 12

    On the security of biquadratic C∗ public-key cryptosystems and its generalizations von Felke, Patrick

    ISSN: 1936-2447, 1936-2455
    Veröffentlicht: New York Springer US 15.05.2019
    Veröffentlicht in Cryptography and communications (15.05.2019)
    “… Public key cryptosystems based on multivariate polynomials have been studied since the eighties …”
    Volltext
    Journal Article
  13. 13

    Exploiting the Incomplete Diffusion Feature: A Specialized Analytical Side-Channel Attack Against the AES and Its Application to Microcontroller Implementations von Shize Guo, Xinjie Zhao, Fan Zhang, Tao Wang, Shi, Zhijie Jerry, Standaert, Francois-Xavier, Chujiao Ma

    ISSN: 1556-6013, 1556-6021
    Veröffentlicht: New York, NY IEEE 01.06.2014
    “… It falls under analytical side-channel attack and can recover the entire key at once. Many ASCAs are proposed against the AES, and they utilize …”
    Volltext
    Journal Article
  14. 14

    Boolean semiring key-exchange with BLAKE3 security (BKEX-B3) von Alvary Kefas Kwala, Alpna Mishra, Shri Kant

    ISSN: 2948-2992
    Veröffentlicht: Springer 27.07.2025
    Veröffentlicht in Discover Computing (27.07.2025)
    “… This work presents a new Boolean Semiring Key Exchange Protocol combined with BLAKE3 cryptographic hash function (BKEX-B3 …”
    Volltext
    Journal Article
  15. 15

    Statistical integral distinguisher with multi-structure and its application on AES-like ciphers von Cui, Tingting, Chen, Huaifeng, Mesnager, Sihem, Sun, Ling, Wang, Meiqin

    ISSN: 1936-2447, 1936-2455
    Veröffentlicht: New York Springer US 01.09.2018
    Veröffentlicht in Cryptography and communications (01.09.2018)
    “… In order to reduce the time complexity of original integral one, Wang et al. firstly proposed a statistical integral distinguisher at FSE’16. However …”
    Volltext
    Journal Article
  16. 16

    Analysis of Computational Time of Simple Estimation of Distribution Algorithms von Chen, Tianshi, Tang, Ke, Chen, Guoliang, Yao, Xin

    ISSN: 1089-778X, 1941-0026
    Veröffentlicht: New York, NY IEEE 01.02.2010
    Veröffentlicht in IEEE transactions on evolutionary computation (01.02.2010)
    “… Impressive experimental results have been reported in the literature. However, little work has been done on analyzing the computation time of EDAs in relation to the problem size …”
    Volltext
    Journal Article
  17. 17

    New approach of exploiting symmetry in SAT-based Boolean matching for FPGA technology mapping von Xiu-qin, Wang, Yang, Yang

    Veröffentlicht: IEEE 01.07.2013
    “… Boolean matching is a key procedure in FPGA technology mapping. SAT-based Boolean matching provides a flexible solution for exploring various FPGA architectures …”
    Volltext
    Tagungsbericht
  18. 18

    Further improvements of the estimation of key enumeration with applications to solving LWE von Budroni, Alessandro, Mårtensson, Erik

    ISSN: 1936-2447, 1936-2455, 1936-2455
    Veröffentlicht: New York Springer US 01.09.2024
    Veröffentlicht in Cryptography and communications (01.09.2024)
    “… The attack strategy consists of a lattice reduction part and a distinguishing part. The latter includes an enumeration subroutine over a certain number of positions of the secret key …”
    Volltext
    Journal Article
  19. 19

    Privacy-Preserving Boolean Range Query With Temporal Access Control in Mobile Computing von Tong, Qiuyun, Li, Xinghua, Miao, Yinbin, Liu, Ximeng, Weng, Jian, Deng, Robert H.

    ISSN: 1041-4347, 1558-2191
    Veröffentlicht: New York IEEE 01.05.2023
    Veröffentlicht in IEEE transactions on knowledge and data engineering (01.05.2023)
    “… ), massive spatio-textual data has been outsourced to cloud servers for storage and analysis such as spatial keyword search …”
    Volltext
    Journal Article
  20. 20

    Cryptanalysis of HFE, multi-HFE and variants for odd and even characteristic von Bettale, Luk, Faugère, Jean-Charles, Perret, Ludovic

    ISSN: 0925-1022, 1573-7586
    Veröffentlicht: Boston Springer US 01.10.2013
    Veröffentlicht in Designs, codes, and cryptography (01.10.2013)
    “… —instead of a univariate polynomial in HFE—over an extension field as a private key. According to the authors, this should make the classical direct algebraic (message-recovery …”
    Volltext
    Journal Article