Search Results - (( key works. boolean function complexity ) OR ( Key york. boolean function complexity ))

Refine Results
  1. 1

    A Grover-Meets-Simon Approach to Match Vector Boolean Functions by Venere, Marco, Barenghi, Alessandro, Pelosi, Gerardo

    ISSN: 2689-1808, 2689-1808
    Published: New York IEEE 2025
    “…The Boolean matching problem via NP-equivalence requires determining whether two Boolean functions are equivalent or not up to a permutation and negation of the input binary variables…”
    Get full text
    Journal Article
  2. 2

    Algebraic immunity for cryptographically significant Boolean functions: analysis and construction by Carlet, C., Dalai, D.K., Gupta, K.C., Maitra, S.

    ISSN: 0018-9448, 1557-9654
    Published: New York, NY IEEE 01.07.2006
    Published in IEEE transactions on information theory (01.07.2006)
    “… It has been observed that a Boolean function f used as a cryptographic primitive, and interpreted as a multivariate polynomial over F/sub 2/, should not have low degree multiples obtained…”
    Get full text
    Journal Article
  3. 3

    SMC: Satisfiability Modulo Convex Programming by Shoukry, Yasser, Nuzzo, Pierluigi, Sangiovanni-Vincentelli, Alberto L., Seshia, Sanjit A., Pappas, George J., Tabuada, Paulo

    ISSN: 0018-9219, 1558-2256
    Published: New York IEEE 01.09.2018
    Published in Proceedings of the IEEE (01.09.2018)
    “… Boolean methods such as satisfiability (SAT) solving are successful in tackling large combinatorial search problems for the design and verification of hardware and software components…”
    Get full text
    Journal Article
  4. 4

    New Techniques for Proving Fine-Grained Average-Case Hardness by Dalirrooyfard, Mina, Lincoln, Andrea, Williams, Virginia Vassilevska

    ISSN: 2575-8454
    Published: IEEE 01.11.2020
    “…The recent emergence of fine-grained cryptography strongly motivates developing an average-case analogue of Fine-Grained Complexity (FGC). Prior work…”
    Get full text
    Conference Proceeding
  5. 5

    A Boolean Network Approach to Estrogen Transcriptional Regulation by Hernández-Lemus, Enrique, Sandoval-Motta, Santiago, Espinal-Enríquez, Jesús, Anda-Jáuregui, Guillermo de

    ISSN: 1076-2787, 1099-0526
    Published: Cairo, Egypt Hindawi Publishing Corporation 01.01.2019
    Published in Complexity (New York, N.Y.) (01.01.2019)
    “… Estrogen is a sex hormone known for its roles in cell proliferation. Its expression has been involved in several physiological functions such as regulating the menstrual and reproduction cycles in women…”
    Get full text
    Journal Article
  6. 6

    STRAUSS: Spectral Transform Use in Stochastic Circuit Synthesis by Alaghi, Armin, Hayes, John P.

    ISSN: 0278-0070, 1937-4151
    Published: New York IEEE 01.11.2015
    “… Its key advantages are low-complexity hardware and high-error tolerance. SC has recently been finding application in several important areas, including image processing, artificial neural networks, and low-density parity check decoding…”
    Get full text
    Journal Article
  7. 7

    Improved Bounds for Wireless Localization by Christ, Tobias, Hoffmann, Michael, Okamoto, Yoshio, Uno, Takeaki

    ISSN: 0178-4617, 1432-0541
    Published: New York Springer-Verlag 01.07.2010
    Published in Algorithmica (01.07.2010)
    “… In other words, the interior of the polygon must be described by a monotone Boolean formula composed from the keys…”
    Get full text
    Journal Article Conference Proceeding
  8. 8

    Perfect Tabular Hashing in Pseudolinear Time by Palit, Shekhar, Wortman, Kevin A.

    Published: IEEE 27.01.2021
    “…We present an algorithm for generating perfect tabulation hashing functions by reduction to Boolean satisfaction (SAT…”
    Get full text
    Conference Proceeding
  9. 9

    On the sample complexity of linear code equivalence for all code rates by Budroni, Alessandro, Natale, Andrea

    ISSN: 1936-2447, 1936-2455
    Published: New York Springer US 01.07.2025
    Published in Cryptography and communications (01.07.2025)
    “… In this work, we generalize the proposed attacks to cover all code rates. We show that the complexity…”
    Get full text
    Journal Article
  10. 10

    Exploiting symmetry in SAT-based boolean matching for heterogeneous FPGA technology mapping by Yu Hu, Shih, V., Majumdar, R., Lei He

    ISBN: 1424413818, 9781424413812
    ISSN: 1092-3152
    Published: IEEE 01.11.2007
    “…The Boolean matching problem is a key procedure in technology mapping for heterogeneous field programmable gate arrays (FPGA…”
    Get full text
    Conference Proceeding
  11. 11

    Success probability of multiple/multidimensional linear cryptanalysis under general key randomisation hypotheses by Samajder, Subhabrata, Sarkar, Palash

    ISSN: 1936-2447, 1936-2455
    Published: New York Springer US 01.09.2018
    Published in Cryptography and communications (01.09.2018)
    “… Expressions for the success probability in terms of the data complexity and the advantage are obtained using the general key randomisation hypotheses for both multidimensional and multiple linear…”
    Get full text
    Journal Article
  12. 12

    On the security of biquadratic C∗ public-key cryptosystems and its generalizations by Felke, Patrick

    ISSN: 1936-2447, 1936-2455
    Published: New York Springer US 15.05.2019
    Published in Cryptography and communications (15.05.2019)
    “…Public key cryptosystems based on multivariate polynomials have been studied since the eighties…”
    Get full text
    Journal Article
  13. 13

    Exploiting the Incomplete Diffusion Feature: A Specialized Analytical Side-Channel Attack Against the AES and Its Application to Microcontroller Implementations by Shize Guo, Xinjie Zhao, Fan Zhang, Tao Wang, Shi, Zhijie Jerry, Standaert, Francois-Xavier, Chujiao Ma

    ISSN: 1556-6013, 1556-6021
    Published: New York, NY IEEE 01.06.2014
    “… It falls under analytical side-channel attack and can recover the entire key at once. Many ASCAs are proposed against the AES, and they utilize…”
    Get full text
    Journal Article
  14. 14

    Boolean semiring key-exchange with BLAKE3 security (BKEX-B3) by Alvary Kefas Kwala, Alpna Mishra, Shri Kant

    ISSN: 2948-2992
    Published: Springer 27.07.2025
    Published in Discover Computing (27.07.2025)
    “… This work presents a new Boolean Semiring Key Exchange Protocol combined with BLAKE3 cryptographic hash function (BKEX-B3…”
    Get full text
    Journal Article
  15. 15

    Statistical integral distinguisher with multi-structure and its application on AES-like ciphers by Cui, Tingting, Chen, Huaifeng, Mesnager, Sihem, Sun, Ling, Wang, Meiqin

    ISSN: 1936-2447, 1936-2455
    Published: New York Springer US 01.09.2018
    Published in Cryptography and communications (01.09.2018)
    “… In order to reduce the time complexity of original integral one, Wang et al. firstly proposed a statistical integral distinguisher at FSE’16. However…”
    Get full text
    Journal Article
  16. 16

    Analysis of Computational Time of Simple Estimation of Distribution Algorithms by Chen, Tianshi, Tang, Ke, Chen, Guoliang, Yao, Xin

    ISSN: 1089-778X, 1941-0026
    Published: New York, NY IEEE 01.02.2010
    “… Impressive experimental results have been reported in the literature. However, little work has been done on analyzing the computation time of EDAs in relation to the problem size…”
    Get full text
    Journal Article
  17. 17

    New approach of exploiting symmetry in SAT-based Boolean matching for FPGA technology mapping by Xiu-qin, Wang, Yang, Yang

    Published: IEEE 01.07.2013
    “…Boolean matching is a key procedure in FPGA technology mapping. SAT-based Boolean matching provides a flexible solution for exploring various FPGA architectures…”
    Get full text
    Conference Proceeding
  18. 18

    Further improvements of the estimation of key enumeration with applications to solving LWE by Budroni, Alessandro, Mårtensson, Erik

    ISSN: 1936-2447, 1936-2455, 1936-2455
    Published: New York Springer US 01.09.2024
    Published in Cryptography and communications (01.09.2024)
    “… The attack strategy consists of a lattice reduction part and a distinguishing part. The latter includes an enumeration subroutine over a certain number of positions of the secret key…”
    Get full text
    Journal Article
  19. 19

    Privacy-Preserving Boolean Range Query With Temporal Access Control in Mobile Computing by Tong, Qiuyun, Li, Xinghua, Miao, Yinbin, Liu, Ximeng, Weng, Jian, Deng, Robert H.

    ISSN: 1041-4347, 1558-2191
    Published: New York IEEE 01.05.2023
    “…), massive spatio-textual data has been outsourced to cloud servers for storage and analysis such as spatial keyword search…”
    Get full text
    Journal Article
  20. 20

    Cryptanalysis of HFE, multi-HFE and variants for odd and even characteristic by Bettale, Luk, Faugère, Jean-Charles, Perret, Ludovic

    ISSN: 0925-1022, 1573-7586
    Published: Boston Springer US 01.10.2013
    Published in Designs, codes, and cryptography (01.10.2013)
    “…—instead of a univariate polynomial in HFE—over an extension field as a private key. According to the authors, this should make the classical direct algebraic (message-recovery…”
    Get full text
    Journal Article