Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
CryptoMiniSat - MaRDI portal

CryptoMiniSat

From MaRDI portal
Software:22051



swMATH10082MaRDI QIDQ22051


No author found.





Related Items (43)

Stream/block ciphers, difference equations and algebraic attacksSubsampling and knowledge distillation on adversarial examples: new techniques for deep learning based side channel evaluationsA Practical Attack on Patched MIFARE ClassicUsing SAT solvers for synchronization issues in non-deterministic automataObservations on the SIMON Block Cipher FamilyA Chosen IV Related Key Attack on Grain-128aAn efficient SAT formulation for learning multiple criteria non-compensatory sorting rules from examplesPySAT: a Python toolkit for prototyping with SAT oraclesComputing the Ramsey number \(R(4,3,3)\) using abstraction and symmetry breakingSide-channel cryptographic attacks using pseudo-Boolean optimizationSoundness of Inprocessing in Clause Sharing SAT SolversDistributed cube and conquer with ParacoobaDRAT-based bit-vector proofs in CVC4An empirical study of branching heuristics through the lens of global learning rateA signature based border basis algorithmApproximate counting in SMT and value estimation for probabilistic programsAn Expressive Model for Instance Decomposition Based Parallel SAT SolversSolving a binary puzzleD2-SYNCHRONIZATION IN NONDETERMINISTIC AUTOMATAAn overview of parallel SAT solvingReformulation based MaxSat robustnessAlgorithm runtime prediction: methods \& evaluationEfficient CNF Simplification Based on Binary Implication GraphsThe configurable SAT solver challenge (CSSC)Observing biases in the state: case studies with Trivium and Trivia-SCAlgebraic Side-Channel Attacks Beyond the Hamming Weight Leakage ModelOptimizing Guessing Strategies for Algebraic Cryptanalysis with Applications to EPCBCStronger Inference through Implied Literals from Conflicts and Knapsack CoversModel counting with error-correcting codesA formal methods approach to predicting new features of the eukaryotic vesicle traffic systemClause vivification by unit propagation in CDCL SAT solversUnnamed ItemExtreme Cases in SAT ProblemsLearning Rate Based Branching Heuristic for SAT SolversSpyBug: Automated Bug Detection in the Configuration Space of SAT SolversOn conversions from CNF to ANFFormal Analysis of the Entropy / Security Trade-off in First-Order Masking Countermeasures against Side-Channel AttacksDRAT Proofs for XOR ReasoningAn algebraic attack to the Bluetooth stream cipher \textsc{E0}Constraints for symmetry breaking in graph representationApplications of SAT Solvers in Cryptanalysis: Finding Weak Keys and PreimagesA preimage attack on reduced \textsc{Gimli}-\textsc{Gash}Ranking with multiple reference points: efficient SAT-based learning procedures


This page was built for software: CryptoMiniSat