boolean functions
Recently Published Documents


TOTAL DOCUMENTS

2662
(FIVE YEARS 409)

H-INDEX

57
(FIVE YEARS 4)

2022 ◽  
Vol 18 (2) ◽  
pp. 1-24
Author(s):  
Saman Froehlich ◽  
Saeideh Shirinzadeh ◽  
Rolf Drechsler

Resistive Random Access Memory (ReRAM) is an emerging non-volatile memory technology. Besides its low power consumption and its high scalability, its inherent computation capabilities make ReRAM especially interesting for future computer architectures. Merging computations into the memory is a promising solution for overcoming the memory bottleneck. To perform computations in ReRAM, efficient synthesis strategies for Boolean functions have to be developed. In this article, we give a thorough presentation of how to employ parallel computing capabilities of ReRAM for the synthesis of functions given state-of-the-art graph-based representations AIGs or BDDs. Additionally, we introduce a new graph-based representation called m-And-Inverter Graph (m-AIGs), which allows us to fully exploit the computing capabilities of ReRAM. In the simulations, we show that our proposed approaches outperform state-of-the art synthesis strategies, and we show the superiority of m-AIGs over the standard AIG representation for ReRAM-based synthesis.


2022 ◽  
Vol 309 ◽  
pp. 269-277
Author(s):  
Dimitrios Gkenosis ◽  
Nathaniel Grammel ◽  
Lisa Hellerstein ◽  
Devorah Kletenik

2022 ◽  
Vol 0 (0) ◽  
pp. 0
Author(s):  
Suman Dutta ◽  
Subhamoy Maitra ◽  
Chandra Sekhar Mukherjee

<p style='text-indent:20px;'>Here we revisit the quantum algorithms for obtaining Forrelation [Aaronson et al., 2015] values to evaluate some of the well-known cryptographically significant spectra of Boolean functions, namely the Walsh spectrum, the cross-correlation spectrum, and the autocorrelation spectrum. We introduce the existing 2-fold Forrelation formulation with bent duality-based promise problems as desirable instantiations. Next, we concentrate on the 3-fold version through two approaches. First, we judiciously set up some of the functions in 3-fold Forrelation so that given oracle access, one can sample from the Walsh Spectrum of <inline-formula><tex-math id="M1">\begin{document}$ f $\end{document}</tex-math></inline-formula>. Using this, we obtain improved results than what one can achieve by exploiting the Deutsch-Jozsa algorithm. In turn, it has implications in resiliency checking. Furthermore, we use a similar idea to obtain a technique in estimating the cross-correlation (and thus autocorrelation) value at any point, improving upon the existing algorithms. Finally, we tweak the quantum algorithm with the superposition of linear functions to obtain a cross-correlation sampling technique. This is the first cross-correlation sampling algorithm with constant query complexity to the best of our knowledge. This also provides a strategy to check if two functions are uncorrelated of degree <inline-formula><tex-math id="M2">\begin{document}$ m $\end{document}</tex-math></inline-formula>. We further modify this using Dicke states so that the time complexity reduces, particularly for constant values of <inline-formula><tex-math id="M3">\begin{document}$ m $\end{document}</tex-math></inline-formula>.</p>


2021 ◽  
Vol 2 (4) ◽  
pp. 1-21
Author(s):  
Stuart Hadfield

Mapping functions on bits to Hamiltonians acting on qubits has many applications in quantum computing. In particular, Hamiltonians representing Boolean functions are required for applications of quantum annealing or the quantum approximate optimization algorithm to combinatorial optimization problems. We show how such functions are naturally represented by Hamiltonians given as sums of Pauli Z operators (Ising spin operators) with the terms of the sum corresponding to the function’s Fourier expansion. For many classes of Boolean functions which are given by a compact description, such as a Boolean formula in conjunctive normal form that gives an instance of the satisfiability problem, it is #P-hard to compute its Hamiltonian representation, i.e., as hard as computing its number of satisfying assignments. On the other hand, no such difficulty exists generally for constructing Hamiltonians representing a real function such as a sum of local Boolean clauses each acting on a fixed number of bits as is common in constraint satisfaction problems. We show composition rules for explicitly constructing Hamiltonians representing a wide variety of Boolean and real functions by combining Hamiltonians representing simpler clauses as building blocks, which are particularly suitable for direct implementation as classical software. We further apply our results to the construction of controlled-unitary operators, and to the special case of operators that compute function values in an ancilla qubit register. Finally, we outline several additional applications and extensions of our results to quantum algorithms for optimization. A goal of this work is to provide a design toolkit for quantum optimization which may be utilized by experts and practitioners alike in the construction and analysis of new quantum algorithms, and at the same time to provide a unified framework for the various constructions appearing in the literature.


2021 ◽  
Vol 13 (4) ◽  
pp. 1-37
Author(s):  
Valentine Kabanets ◽  
Sajin Koroth ◽  
Zhenjian Lu ◽  
Dimitrios Myrisiotis ◽  
Igor C. Oliveira

The class FORMULA[s]∘G consists of Boolean functions computable by size- s De Morgan formulas whose leaves are any Boolean functions from a class G. We give lower bounds and (SAT, Learning, and pseudorandom generators ( PRG s )) algorithms for FORMULA[n 1.99 ]∘G, for classes G of functions with low communication complexity . Let R (k) G be the maximum k -party number-on-forehead randomized communication complexity of a function in G. Among other results, we show the following: • The Generalized Inner Product function GIP k n cannot be computed in FORMULA[s]° G on more than 1/2+ε fraction of inputs for s=o(n 2 /k⋅4 k ⋅R (k) (G)⋅log⁡(n/ε)⋅log⁡(1/ε)) 2 ). This significantly extends the lower bounds against bipartite formulas obtained by [62]. As a corollary, we get an average-case lower bound for GIP k n against FORMULA[n 1.99 ]∘PTF k −1 , i.e., sub-quadratic-size De Morgan formulas with degree-k-1) PTF ( polynomial threshold function ) gates at the bottom. Previously, it was open whether a super-linear lower bound holds for AND of PTFs. • There is a PRG of seed length n/2+O(s⋅R (2) (G)⋅log⁡(s/ε)⋅log⁡(1/ε)) that ε-fools FORMULA[s]∘G. For the special case of FORMULA[s]∘LTF, i.e., size- s formulas with LTF ( linear threshold function ) gates at the bottom, we get the better seed length O(n 1/2 ⋅s 1/4 ⋅log⁡(n)⋅log⁡(n/ε)). In particular, this provides the first non-trivial PRG (with seed length o(n)) for intersections of n halfspaces in the regime where ε≤1/n, complementing a recent result of [45]. • There exists a randomized 2 n-t #SAT algorithm for FORMULA[s]∘G, where t=Ω(n\√s⋅log 2 ⁡(s)⋅R (2) (G))/1/2. In particular, this implies a nontrivial #SAT algorithm for FORMULA[n 1.99 ]∘LTF. • The Minimum Circuit Size Problem is not in FORMULA[n 1.99 ]∘XOR; thereby making progress on hardness magnification, in connection with results from [14, 46]. On the algorithmic side, we show that the concept class FORMULA[n 1.99 ]∘XOR can be PAC-learned in time 2 O(n/log n) .


Author(s):  
Kaisa Nyberg

The goal of this work is to propose a related-key model for linear cryptanalysis. We start by giving the mean and variance of the difference of sampled correlations of two Boolean functions when using the same sample of inputs to compute both correlations. This result is further extended to determine the mean and variance of the difference of correlations of a pair of Boolean functions taken over a random data sample of fixed size and over a random pair of Boolean functions. We use the properties of the multinomial distribution to achieve these results without independence assumptions. Using multivariate normal approximation of the multinomial distribution we obtain that the distribution of the difference of related-key correlations is approximately normal. This result is then applied to existing related-key cryptanalyses. We obtain more accurate right-key and wrong-key distributions and remove artificial assumptions about independence of sampled correlations. We extend this study to using multiple linear approximations and propose a Χ2-type statistic, which is proven to be Χ2 distributed if the linear approximations are independent. We further examine this statistic for multidimensional linear approximation and discuss why removing the assumption about independence of linear approximations does not work in the related-key setting the same way as in the single-key setting.


Sign in / Sign up

Export Citation Format

Share Document