Sciweavers

706 search results - page 80 / 142
» On a quasi-ordering on Boolean functions
Sort
View
CAV
2007
Springer
127views Hardware» more  CAV 2007»
14 years 3 months ago
CVC3
Abstract. CVC3, a joint project of NYU and U Iowa, is the new and latest version of the Cooperating Validity Checker. CVC3 extends and builds on the functionality of its predecesso...
Clark Barrett, Cesare Tinelli
CRYPTO
2003
Springer
156views Cryptology» more  CRYPTO 2003»
14 years 2 months ago
Fast Algebraic Attacks on Stream Ciphers with Linear Feedback
Many popular stream ciphers apply a filter/combiner to the state of one or several LFSRs. Algebraic attacks on such ciphers [10, 11] are possible, if there is a multivariate relat...
Nicolas Courtois
ISMIS
1994
Springer
14 years 1 months ago
BDDs and Automated Deduction
BDDs (binary decision diagrams) are a very succesful tool for handling boolean functions, but one which has not yet attracted the attention of many automated deduction specialists....
Jean Goubault, Joachim Posegga
STOC
1992
ACM
91views Algorithms» more  STOC 1992»
14 years 1 months ago
Randomized versus Nondeterministic Communication Complexity
Paul Beame Joan Lawry Department of Computer Science and Engineering, FR-35 University of Washington Seattle, Washington 98195 Our main result is the demonstration of a Boolean fu...
Paul Beame, Joan Lawry
ICISC
2004
120views Cryptology» more  ICISC 2004»
13 years 10 months ago
Algebraic Attacks on Combiners with Memory and Several Outputs
Algebraic attacks on stream ciphers [14] recover the key by solving an overdefined system of multivariate equations. Such attacks can break several interesting cases of LFSR-based ...
Nicolas Courtois