Augment with care: Contrastive learning for combinatorial problems

H Duan, P Vaezipoor, MB Paulus… - International …, 2022 - proceedings.mlr.press
Supervised learning can improve the design of state-of-the-art solvers for combinatorial
problems, but labelling large numbers of combinatorial instances is often impractical due to …

SHA-256 collision attack with programmatic SAT

N Alamgir, S Nejati, C Bright - arXiv preprint arXiv:2406.20072, 2024 - arxiv.org
Cryptographic hash functions play a crucial role in ensuring data security, generating fixed-
length hashes from variable-length inputs. The hash function SHA-256 is trusted for data …

Comparison of SAT-based and ASP-based algorithms for inconsistency measurement

I Kuhlmann, A Gessler, V Laszlo, M Thimm - arXiv preprint arXiv …, 2023 - arxiv.org
We present algorithms based on satisfiability problem (SAT) solving, as well as answer set
programming (ASP), for solving the problem of determining inconsistency degrees in …

Inverting cryptographic hash functions via Cube-and-Conquer

O Zaikin - Journal of Artificial Intelligence Research, 2024 - jair.org
MD4 and MD5 are fundamental cryptographic hash functions proposed in the early 1990s.
MD4 consists of 48 steps and produces a 128-bit hash given a message of arbitrary finite …

A machine learning based splitting heuristic for divide-and-conquer solvers

S Nejati, L Le Frioux, V Ganesh - … Conference, CP 2020, Louvain-la-Neuve …, 2020 - Springer
In this paper, we present a machine learning based splitting heuristic for divide-and-conquer
parallel Boolean SAT solvers. Splitting heuristics, whether they are look-ahead or look-back …

Learning plaintext-ciphertext cryptographic problems via anf-based sat instance representation

X Zheng, Y Li, C Fan, H Wu, X Song… - The Thirty-eighth Annual …, 2024 - openreview.net
Cryptographic problems, operating within binary variable spaces, can be routinely
transformed into Boolean Satisfiability (SAT) problems regarding specific cryptographic …

Challenges of acquiring compositional inductive biases via meta-learning

M Anastacio, T Matricon… - ECMLPKDD Workshop on …, 2022 - proceedings.mlr.press
Comparing the performance of two configurations of a given algorithm plays a critical role in
algorithm configuration and performance optimisation, be it automated or manual, and …

Inverting Step-Reduced SHA-1 and MD5 by Parameterized SAT Solvers

O Zaikin - 30th International Conference on Principles and …, 2024 - drops.dagstuhl.de
MD5 and SHA-1 are fundamental cryptographic hash functions proposed in 1990s. Given a
message of arbitrary finite size, MD5 produces a 128-bit hash in 64 steps, while SHA-1 …

Cdcl (crypto) and machine learning based sat solvers for cryptanalysis

S Nejati - 2020 - uwspace.uwaterloo.ca
Over the last two decades, we have seen a dramatic improvement in the efficiency of conflict-
driven clause-learning Boolean satisfiability (CDCL SAT) solvers over industrial problems …

Cryptoanalysis of Simple Substitution Ciphers with Genetic Algorithms

D Savić, P Milić, B Mazinjanin - 2024 - nopr.niscpr.res.in
Recent advances in the field of machine learning have once again raised the question
whether computers can be trained to perform cryptanalytic tasks. In this paper, we identify …