Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleJune 2021
Evolutionary algorithms-assisted construction of cryptographic boolean functions
GECCO '21: Proceedings of the Genetic and Evolutionary Computation ConferencePages 565–573https://doi.org/10.1145/3449639.3459362In the last few decades, evolutionary algorithms were successfully applied numerous times for creating Boolean functions with good cryptographic properties. Still, the applicability of such approaches was always limited as the cryptographic community ...
- research-articleNovember 2019
TGA: An Oracle-less and Topology-Guided Attack on Logic Locking
ASHES'19: Proceedings of the 3rd ACM Workshop on Attacks and Solutions in Hardware Security WorkshopPages 75–83https://doi.org/10.1145/3338508.3359576Due to the outsourcing of semiconductor design and manufacturing, a number of threats have emerged in recent years, and they are overproduction of integrated circuits (ICs), illegal sale of defective ICs, and piracy of intellectual properties (IPs). ...
- research-articleJuly 2018
Evolving boolean functions for fast and efficient randomness testing
GECCO '18: Proceedings of the Genetic and Evolutionary Computation ConferencePages 1302–1309https://doi.org/10.1145/3205455.3205518The security of cryptographic algorithms (such as block ciphers and hash functions) is often evaluated in terms of their output randomness. This paper presents a novel method for the statistical randomness testing of cryptographic primitives, which is ...
- short-paperFebruary 2015
Technology Mapping into General Programmable Cells
FPGA '15: Proceedings of the 2015 ACM/SIGDA International Symposium on Field-Programmable Gate ArraysPages 70–73https://doi.org/10.1145/2684746.2689082Field-Programmable Gate Arrays (FPGA) implement logic functions using programmable cells, such as K-input lookup-tables (K-LUTs). A K-LUT can implement any Boolean function with K inputs and one output. Methods for mapping into K-LUTs are extensively ...
- ArticleOctober 2012
Semi-bent functions with multiple trace terms and hyperelliptic curves
LATINCRYPT'12: Proceedings of the 2nd international conference on Cryptology and Information Security in Latin AmericaPages 18–36https://doi.org/10.1007/978-3-642-33481-8_2Semi-bent functions with even number of variables are a class of important Boolean functions whose Hadamard transform takes three values. Semi-bent functions have been extensively studied due to their applications in cryptography and coding theory. In ...
-
- ArticleJune 2012
Arithmetic walsh transform of quadratic boolean functions
SETA'12: Proceedings of the 7th international conference on Sequences and Their ApplicationsPages 65–76https://doi.org/10.1007/978-3-642-30615-0_6Recently an arithmetic or "with carry" analog of the Walsh-Hadamard transform of Boolean functions was defined. In this paper we compute the arithmetic Walsh transforms of quadratic functions. We find that, as with traditional Walsh-Hadamard transform, ...
- research-articleMay 2012
Nearly optimal solutions for the chow parameters problem and low-weight approximation of halfspaces
STOC '12: Proceedings of the forty-fourth annual ACM symposium on Theory of computingPages 729–746https://doi.org/10.1145/2213977.2214043The Chow parameters of a Boolean function f: {-1,1}n -> {-1,1} are its n+1 degree-0 and degree-1 Fourier coefficients. It has been known since 1961 [Cho61, Tan61] that the (exact values of the) Chow parameters of any linear threshold function f uniquely ...
- ArticleMay 2011
Energy and fan-in of threshold circuits computing mod functions
TAMC'11: Proceedings of the 8th annual conference on Theory and applications of models of computationPages 154–163In this paper, we consider a threshold circuit C computing the modulus function MODm, and investigate a relationship between two complexity measures, fan-in l and energy e of C, where the fan-in l is defined to be the maximum number of inputs of every ...
- articleDecember 2010
On the Number of Two-Dimensional Threshold Functions
SIAM Journal on Discrete Mathematics (SIDMA), Volume 24, Issue 4Pages 1617–1631https://doi.org/10.1137/090750184A two-dimensional threshold function of $k$-valued logic can be viewed as a coloring of the points of a $k\times k$ square lattice into two colors such that there exists a straight line separating points of different colors. For the number of such ...
- ArticleOctober 2010
A set theory based method to derive network reliability expressions of complex system topologies
ACC'10: Proceedings of the 2010 international conference on Applied computing conferencePages 108–114Network reliability evaluation is important for the planning, design and control of arbitrary systems. A novel set theory based method for deriving terminal reliability expressions of complex system configurations is described in this paper. The ...
- research-articleSeptember 2010
A lower bound on the optimum distance profiles of the second-order Reed-Muller codes
IEEE Transactions on Information Theory (ITHR), Volume 56, Issue 9Pages 4309–4320https://doi.org/10.1109/TIT.2010.2054512In this paper, we give a lower bound for the optimum distance profiles of the second-order Reed-Muller code in the dictionary order and in the inverse dictionary order. In particular, we investigate the second-order Reed-Muller codes of length ≤256. We ...
- ArticleJune 2010
Hyper-bent Boolean functions with multiple trace terms
WAIFI'10: Proceedings of the Third international conference on Arithmetic of finite fieldsPages 97–113Bent functions are maximally nonlinear Boolean functions with an even number of variables. These combinatorial objects, with fascinating properties, are rare. The class of bent functions contains a subclass of functions the so-called hyper-bent ...
- ArticleJune 2010
Quantum query algorithms for conjunctions
Every Boolean function can be presented as a logical formula in conjunctive normal form. Fast algorithm for conjunction plays significant role in overall algorithm for computing arbitrary Boolean function. First, we present a quantum query algorithm for ...
- research-articleJune 2010
Bounding the average sensitivity and noise sensitivity of polynomial threshold functions
- Ilias Diakonikolas,
- Prahladh Harsha,
- Adam Klivans,
- Raghu Meka,
- Prasad Raghavendra,
- Rocco A. Servedio,
- Li-Yang Tan
STOC '10: Proceedings of the forty-second ACM symposium on Theory of computingPages 533–542https://doi.org/10.1145/1806689.1806763We give the first non-trivial upper bounds on the average sensitivity and noise sensitivity of degree-d polynomial threshold functions (PTFs). These bounds hold both for PTFs over the Boolean hypercube {-1,1}n and for PTFs over Rn under the standard n-...
- research-articleJune 2010
On correctable errors of binary linear codes
IEEE Transactions on Information Theory (ITHR), Volume 56, Issue 6Pages 2537–2548https://doi.org/10.1109/TIT.2010.2046209The error correction capability of binary linear codes with minimum distance decoding, in particular the number of correctable/uncorrectable errors, is investigated for general linear codes and the first-order Reed-Muller codes. For linear codes, a lower ...
- research-articleMay 2010
High precision quantum query algorithm for computing AND-based boolean functions
CF '10: Proceedings of the 7th ACM international conference on Computing frontiersPages 247–256https://doi.org/10.1145/1787275.1787332Quantum algorithms can be analyzed in a query model to compute Boolean functions. Function input is provided in a black box, and the aim is to compute the function value using as few queries to the black box as possible. The complexity of the algorithm ...
- ArticleDecember 2009
Bitwise higher order differential cryptanalysis
INTRUST'09: Proceedings of the First international conference on Trusted SystemsPages 250–262https://doi.org/10.1007/978-3-642-14597-1_16This paper attempts to utilize the ideas of higher order differential cryptanalysis to investigate Boolean algebra based block ciphers. The theoretical foundation is built for later research, and two kinds of distinguishing attacks are proposed. The ...
- ArticleMay 2009
Boolean Functions for Pair Sharing Analysis
ICNDS '09: Proceedings of the 2009 International Conference on Networking and Digital Society - Volume 01Pages 242–245https://doi.org/10.1109/ICNDS.2009.66This paper presents an encoding scheme for pair sharing. Pair sharing relations and abstract operations required for a pair sharing analysis are encoded as Boolean functions and operations on Boolean functions. Preliminary experimental results with a ...
- research-articleMay 2008
The chow parameters problem
STOC '08: Proceedings of the fortieth annual ACM symposium on Theory of computingPages 517–526https://doi.org/10.1145/1374376.1374450In the 2nd Annual FOCS (1961), C. K. Chow proved that every Boolean threshold function is uniquely determined by its degree-0 and degree-1 Fourier coefficients. These numbers became known as the Chow Parameters. Providing an algorithmic version of Chow'...
- ArticleDecember 2007
Construction of rotation symmetric Boolean functions on odd number of variables with maximum algebraic immunity
In this paper we present a theoretical construction of Rotation Symmetric Boolean Functions (RSBFs) on odd number of variables with maximum possible algebraic immunity (AI) and further these functions are not symmetric. Our RSBFs are of better ...