Graph-Based Algorithms for Boolean Function Manipulation
IEEE Transactions on Computers
Implicit and incremental computation of primes and essential primes of Boolean functions
DAC '92 Proceedings of the 29th ACM/IEEE Design Automation Conference
“One sugar cube, please” or selection strategies in the Buchberger algorithm
ISSAC '91 Proceedings of the 1991 international symposium on Symbolic and algebraic computation
The MAGMA algebra system I: the user language
Journal of Symbolic Computation - Special issue on computational algebra and number theory: proceedings of the first MAGMA conference
Converting bases with the Gröbner walk
Journal of Symbolic Computation - Special issue on computational algebra and number theory: proceedings of the first MAGMA conference
Monomial representations for Gröbner bases computations
ISSAC '98 Proceedings of the 1998 international symposium on Symbolic and algebraic computation
Logic Synthesis and Verification Algorithms
Logic Synthesis and Verification Algorithms
Implicit manipulation of polynomials using zero-suppressed BDDs
EDTC '95 Proceedings of the 1995 European conference on Design and Test
SINGULAR: a computer algebra system for polynomial computations
ACM Communications in Computer Algebra
The Python Language Reference Manual
The Python Language Reference Manual
Small scale variants of the AES
FSE'05 Proceedings of the 12th international conference on Fast Software Encryption
An algebraic interpretation of AES-128
AES'04 Proceedings of the 4th international conference on Advanced Encryption Standard
Linear (Hull) and Algebraic Cryptanalysis of the Block Cipher PRESENT
CANS '09 Proceedings of the 8th International Conference on Cryptology and Network Security
MXL3: an efficient algorithm for computing gröbner bases of zero-dimensional ideals
ICISC'09 Proceedings of the 12th international conference on Information security and cryptology
Journal of Symbolic Computation
Modifying Faugère's F5 algorithm to ensure termination
ACM Communications in Computer Algebra
Algebraic techniques in differential cryptanalysis revisited
ACISP'11 Proceedings of the 16th Australasian conference on Information security and privacy
On the relation between the MXL family of algorithms and Gröbner basis algorithms
Journal of Symbolic Computation
Conditional differential cryptanalysis of trivium and KATAN
SAC'11 Proceedings of the 18th international conference on Selected Areas in Cryptography
STOC '12 Proceedings of the forty-fourth annual ACM symposium on Theory of computing
Gröbner-free normal forms for Boolean polynomials
Journal of Symbolic Computation
Proceedings of the 4th conference on Innovations in Theoretical Computer Science
A logic-algebraic approach to decision taking in a railway interlocking system
Annals of Mathematics and Artificial Intelligence
Some trade-off results for polynomial calculus: extended abstract
Proceedings of the forty-fifth annual ACM symposium on Theory of computing
Hi-index | 0.00 |
This work presents a new framework for Grobner-basis computations with Boolean polynomials. Boolean polynomials can be modelled in a rather simple way, with both coefficients and degree per variable lying in {0,1}. The ring of Boolean polynomials is, however, not a polynomial ring, but rather the quotient ring of the polynomial ring over the field with two elements modulo the field equations x^2=x for each variable x. Therefore, the usual polynomial data structures seem not to be appropriate for fast Grobner-basis computations. We introduce a specialised data structure for Boolean polynomials based on zero-suppressed binary decision diagrams (ZDDs), which are capable of handling these polynomials more efficiently with respect to memory consumption and also computational speed. Furthermore, we concentrate on high-level algorithmic aspects, taking into account the new data structures as well as structural properties of Boolean polynomials. For example, a new useless-pair criterion for Grobner-basis computations in Boolean rings is introduced. One of the motivations for our work is the growing importance of formal hardware and software verification based on Boolean expressions, which suffer-besides from the complexity of the problems -from the lack of an adequate treatment of arithmetic components. We are convinced that algebraic methods are more suited and we believe that our preliminary implementation shows that Grobner-bases on specific data structures can be capable of handling problems of industrial size.