Sciweavers

290 search results - page 11 / 58
» Lattice-based computation of Boolean functions
Sort
View
FSE
2006
Springer
109views Cryptology» more  FSE 2006»
13 years 11 months ago
Computing the Algebraic Immunity Efficiently
The purpose of algebraic attacks on stream and block ciphers is to recover the secret key by solving an overdefined system of multivariate algebraic equations. They become very eff...
Frédéric Didier, Jean-Pierre Tillich
FOCS
2010
IEEE
13 years 5 months ago
Bounded Independence Fools Degree-2 Threshold Functions
For an n-variate degree
Ilias Diakonikolas, Daniel M. Kane, Jelani Nelson
FOCS
1994
IEEE
13 years 11 months ago
On Rank vs. Communication Complexity
This paper concerns the open problem of Lov
Noam Nisan, Avi Wigderson
VLSID
2004
IEEE
108views VLSI» more  VLSID 2004»
14 years 8 months ago
Boolean Decomposition Using Two-literal Divisors
This paper is an attempt to answer the following question: how much improvement can be obtained in logic decomposition by using Boolean divisors? Traditionally, the existence of t...
Nilesh Modi, Jordi Cortadella
FCT
2001
Springer
14 years 2 days ago
Dense Families and Key Functions of Database Relation Instances
In this paper dense families of database relations are introduced. We characterize dependencies and keys of relation instances in terms of dense families. Key functions are also in...
Jouni Järvinen