Search Results - key ((yorks. OR yorks.) OR york.) boolean function complexity*

Refine Results
  1. 1

    Privacy-Preserving Boolean Range Query With Temporal Access Control in Mobile Computing by Tong, Qiuyun, Li, Xinghua, Miao, Yinbin, Liu, Ximeng, Weng, Jian, Deng, Robert H.

    ISSN: 1041-4347, 1558-2191
    Published: New York IEEE 01.05.2023
    “…), massive spatio-textual data has been outsourced to cloud servers for storage and analysis such as spatial keyword search…”
    Get full text
    Journal Article
  2. 2

    Minimum complexity drives regulatory logic in Boolean models of living systems by Subbaroyan, Ajay, Martin, Olivier C, Samal, Areejit

    ISSN: 2752-6542, 2752-6542
    Published: England Oxford University Press 01.03.2022
    Published in PNAS nexus (01.03.2022)
    “… However, the Boolean functions (BFs) specifying the associated logical update rules should not be expected to be random…”
    Get full text
    Journal Article
  3. 3

    Complexity Analysis of the SAT Attack on Logic Locking by Zhong, Yadi, Guin, Ujjwal

    ISSN: 0278-0070, 1937-4151
    Published: New York IEEE 01.10.2023
    “… Logic locking emerges as a primary design-for-security measure to counter these threats, where ICs become fully functional only when unlocked with a secret key…”
    Get full text
    Journal Article
  4. 4

    Level-Based Analysis of Genetic Algorithms and Other Search Processes by Corus, Dogan, Dang, Duc-Cuong, Eremeev, Anton V., Lehre, Per Kristian

    ISSN: 1089-778X, 1941-0026
    Published: New York IEEE 01.10.2018
    “…Understanding how the time complexity of evolutionary algorithms (EAs) depend on their parameter settings and characteristics of fitness landscapes is a fundamental problem in evolutionary computation…”
    Get full text
    Journal Article
  5. 5

    Fast Algebraic Attacks and Decomposition of Symmetric Boolean Functions by Liu, Meicheng, Lin, Dongdai, Pei, Dingyi

    ISSN: 0018-9448, 1557-9654
    Published: New York, NY IEEE 01.07.2011
    Published in IEEE transactions on information theory (01.07.2011)
    “…In this correspondence, first we give a decomposition of symmetric Boolean functions, then we show that almost all symmetric Boolean functions, including these functions with good algebraic immunity…”
    Get full text
    Journal Article
  6. 6

    A Grover-Meets-Simon Approach to Match Vector Boolean Functions by Venere, Marco, Barenghi, Alessandro, Pelosi, Gerardo

    ISSN: 2689-1808, 2689-1808
    Published: New York IEEE 2025
    “…The Boolean matching problem via NP-equivalence requires determining whether two Boolean functions are equivalent or not up to a permutation and negation of the input binary variables…”
    Get full text
    Journal Article
  7. 7

    Network Classification Based on Reducibility With Respect to the Stability of Canalizing Power of Genes in a Gene Regulatory Network - A Boolean Network Modeling Perspective by Kim, Eunji, Ivanov, Ivan, Dougherty, Edward R.

    ISSN: 1545-5963, 1557-9964, 1557-9964
    Published: United States IEEE 01.01.2022
    “…A key objective of studying biological systems is to design therapeutic intervention strategies for beneficially altering cell dynamics…”
    Get full text
    Journal Article
  8. 8

    On the Efficiency of Polar-Like Decoding for Symmetric Codes by Ivanov, Kirill, Urbanke, Rudiger L.

    ISSN: 0090-6778, 1558-0857
    Published: New York IEEE 01.01.2022
    Published in IEEE transactions on communications (01.01.2022)
    “… grows too fast to make the decoding practical even for moderate block lengths. The key ingredient for proving the capacity-achieving property of Reed-Muller and eBCH codes is their group of symmetries…”
    Get full text
    Journal Article
  9. 9

    SMC: Satisfiability Modulo Convex Programming by Shoukry, Yasser, Nuzzo, Pierluigi, Sangiovanni-Vincentelli, Alberto L., Seshia, Sanjit A., Pappas, George J., Tabuada, Paulo

    ISSN: 0018-9219, 1558-2256
    Published: New York IEEE 01.09.2018
    Published in Proceedings of the IEEE (01.09.2018)
    “… Boolean methods such as satisfiability (SAT) solving are successful in tackling large combinatorial search problems for the design and verification of hardware and software components…”
    Get full text
    Journal Article
  10. 10

    Dichotomy for Holant∗ Problems on the Boolean Domain by Cai, Jin-Yi, Lu, Pinyan, Xia, Mingji

    ISSN: 1432-4350, 1433-0490
    Published: New York Springer US 01.11.2020
    Published in Theory of computing systems (01.11.2020)
    “… ) , where F is a set of constraint functions on Boolean variables and taking complex values…”
    Get full text
    Journal Article
  11. 11

    Improving Linear Key Recovery Attacks using Walsh Spectrum Puncturing by Flórez-Gutiérrez, Antonio, Todo, Yosuke

    ISSN: 0933-2790, 1432-1378
    Published: New York Springer Nature B.V 01.10.2025
    Published in Journal of cryptology (01.10.2025)
    “…In most linear key recovery attacks on block ciphers, the value of the target linear approximation is determined from the plaintext, ciphertext and key by a function…”
    Get full text
    Journal Article
  12. 12

    Approximate Logic Synthesis of Very Large Boolean Networks by Echavarria, Jorge, Wildermann, Stefan, Teich, Jurgen

    ISSN: 1558-1101
    Published: EDAA 01.02.2021
    “…For very large Boolean circuits most approximate logic synthesis techniques successively apply local approximation transformations affecting only a portion of the whole design…”
    Get full text
    Conference Proceeding
  13. 13

    Some Conditional Cube Testers for Grain-128a of Reduced Rounds by Dalai, Deepak Kumar, Pal, Santu, Sarkar, Santanu

    ISSN: 0018-9340, 1557-9956
    Published: New York IEEE 01.06.2022
    Published in IEEE transactions on computers (01.06.2022)
    “…In this article, a new strategy, maximum last <inline-formula><tex-math notation="LaTeX">\alpha</tex-math>…”
    Get full text
    Journal Article
  14. 14

    Improving the Lower Bound on the Higher Order Nonlinearity of Boolean Functions With Prescribed Algebraic Immunity by Mesnager, S.

    ISSN: 0018-9448, 1557-9654
    Published: New York, NY IEEE 01.08.2008
    Published in IEEE transactions on information theory (01.08.2008)
    “… The algebraic immunity of a Boolean function quantifies its resistance to the standard algebraic attacks of the pseudorandom generators using it as a nonlinear filtering or combining function…”
    Get full text
    Journal Article
  15. 15

    New Techniques for Proving Fine-Grained Average-Case Hardness by Dalirrooyfard, Mina, Lincoln, Andrea, Williams, Virginia Vassilevska

    ISSN: 2575-8454
    Published: IEEE 01.11.2020
    “…The recent emergence of fine-grained cryptography strongly motivates developing an average-case analogue of Fine-Grained Complexity (FGC). Prior work…”
    Get full text
    Conference Proceeding
  16. 16

    A Trade-Off between Sample Complexity and Computational Complexity in Learning Boolean Networks from Time-Series Data by Perkins, T.J., Hallett, M.T.

    ISSN: 1545-5963, 1557-9964, 1557-9964
    Published: United States IEEE 01.01.2010
    “…A key problem in molecular biology is to infer regulatory relationships between genes from expression data…”
    Get full text
    Journal Article
  17. 17

    On Analysis of Lightweight Stream Ciphers with Keyed Update by Kara, Orhun, Esgin, Muhammed F.

    ISSN: 0018-9340, 1557-9956
    Published: New York IEEE 01.01.2019
    Published in IEEE transactions on computers (01.01.2019)
    “… ciphers in compliance with the rule of thumb that the internal state size should be at least twice as the key size to defend against generic Time-Memory-Data Tradeoff (TMDT) attacks…”
    Get full text
    Journal Article
  18. 18

    A New Cube Attack on MORUS by Using Division Property by Ye, Tao, Wei, Yongzhuang, Meier, Willi

    ISSN: 0018-9340, 1557-9956
    Published: New York IEEE 01.12.2019
    Published in IEEE transactions on computers (01.12.2019)
    “…MORUS is an authenticated encryption algorithm and one of the candidates in the CAESAR competition. Currently, the security of MORUS received extensive…”
    Get full text
    Journal Article
  19. 19

    Fast Discrete Fourier Spectra Attacks on Stream Ciphers by Guang Gong, Ronjom, S., Helleseth, T., Honggang Hu

    ISSN: 0018-9448, 1557-9654
    Published: New York, NY IEEE 01.08.2011
    Published in IEEE transactions on information theory (01.08.2011)
    “…In this paper, some new results are presented on the selective discrete Fourier spectra attack introduced first as the Rønjom-Helleseth attack and the…”
    Get full text
    Journal Article
  20. 20

    On Guess and Determine Cryptanalysis of LFSR-Based Stream Ciphers by Pasalic, E.

    ISSN: 0018-9448, 1557-9654
    Published: New York, NY IEEE 01.07.2009
    Published in IEEE transactions on information theory (01.07.2009)
    “…In this paper, the complexity of applying a guess and determine attack to so-called Linear Feedback Shift register (LFSR…”
    Get full text
    Journal Article