Logical analysis of hash functions

D Jovanović, P Janičić - International Workshop on Frontiers of Combining …, 2005 - Springer
In this paper we report on a novel approach for uniform encoding of hash functions (but also
other cryptographic functions) into propositional logic formulae, and reducing cryptanalysis …

Parallel hybrid method for SAT that couples genetic algorithms and local search

G Folino, C Pizzuti, G Spezzano - IEEE Transactions on …, 2001 - ieeexplore.ieee.org
A parallel hybrid method for solving the satisfiability (SAT) problem that combines cellular
genetic algorithms (GAs) and the random walk SAT (WSAT) strategy of greedy SAT (GSAT) …

Алгебраическая криптография

ВА Романьков - 2013 - elibrary.ru
Монография содержит авторское изложение одного из современных направлений
исследований-криптографии, основанной на группах (в английской терминологии …

Online negative databases

F Esponda, ES Ackley, S Forrest, P Helman - International Conference on …, 2004 - Springer
The benefits of negative detection for obscuring information are explored in the context of
Artificial Immune Systems (AIS). AIS based on string matching have the potential for an extra …

[PDF][PDF] Enhancing privacy through negative representations of data

F Esponda, S Forrest, P Helman - 2004 - iar.cs.unm.edu
The paper introduces the concept of a negative database, in which a set of records DB is
represented by its complement set. That is, all the records not in DB are represented, and …

[PDF][PDF] Symbolic task inference in deep reinforcement learning

H Hasanbeig, NY Jeppu, A Abate, T Melham… - Journal of Artificial …, 2023 - cs.ox.ac.uk
This paper proposes DeepSynth, a method for effective training of deep reinforcement
learning agents when the reward is sparse or non-Markovian, but at the same time progress …

One-time password authentication scheme based on the negative database

D Zhao, W Luo - Engineering Applications of Artificial Intelligence, 2017 - Elsevier
In this paper, a novel one-time password authentication scheme based on the negative
database (NDB) is proposed. The authentication data, which involve a user password and …

Security margin evaluation of SHA-3 contest finalists through SAT-based attacks

E Homsirikamol, P Morawiecki, M Rogawski… - … Information Systems and …, 2012 - Springer
Abstract In 2007, the US National Institute of Standards and Technology (NIST) announced
a public contest aiming at the selection of a new standard for a cryptographic hash function …

Backdoor sets for DLL subsolvers

S Szeider - Journal of Automated Reasoning, 2005 - Springer
We study the parameterized complexity of detecting small backdoor sets for instances of the
propositional satisfiability problem (SAT). The notion of backdoor sets has been recently …

An experimental study of adaptive control for evolutionary algorithms

G Di Tollo, F Lardeux, J Maturana, F Saubion - Applied Soft Computing, 2015 - Elsevier
In this paper, we investigate how adaptive operator selection techniques are able to
efficiently manage the balance between exploration and exploitation in an evolutionary …