On Cryptographic Attacks Using Backdoors for SAT.
Alexander A. SemenovOleg ZaikinIlya V. OtpuschennikovStepan KochemazovAlexey IgnatievPublished in: AAAI (2018)
Keyphrases
- sat solvers
- satisfiability problem
- sat instances
- security protocols
- differential power analysis
- cryptographic protocols
- sat problem
- cryptographic algorithms
- smart card
- sat solving
- advanced encryption standard
- stream cipher
- boolean satisfiability
- propositional satisfiability
- np complete
- block cipher
- phase transition
- temporal logic
- power analysis
- max sat
- stochastic local search
- search algorithm
- search space
- security mechanisms
- countermeasures
- constraint satisfaction
- security properties
- security threats
- sat encodings
- optimal solution
- stochastic local search algorithms
- key management
- randomly generated
- search strategies
- hidden structure
- search tree
- orders of magnitude
- boolean formula
- digital signature
- computational properties
- constraint satisfaction problems