On Cryptographic Attacks Using Backdoors for SAT.
Alexander A. SemenovOleg ZaikinIlya V. OtpuschennikovStepan KochemazovAlexey IgnatievPublished in: CoRR (2018)
Keyphrases
- sat solvers
- satisfiability problem
- sat instances
- security protocols
- differential power analysis
- sat problem
- cryptographic protocols
- cryptographic algorithms
- smart card
- boolean satisfiability
- stream cipher
- constraint satisfaction
- propositional satisfiability
- search algorithm
- stochastic local search
- np complete
- advanced encryption standard
- orders of magnitude
- block cipher
- countermeasures
- phase transition
- temporal logic
- security mechanisms
- max sat
- security properties
- hash functions
- stochastic local search algorithms
- security risks
- key management
- watermarking scheme
- randomly generated
- search tree
- search strategies
- s box
- digital signature
- security threats
- digital watermarking
- watermarking algorithm
- power analysis
- access control
- protection schemes
- search space