Zobrazeno 1 - 9
of 9
pro vyhledávání: '"Saeed Nejati"'
Publikováno v:
International Journal on Software Tools for Technology Transfer. 25:219-239
Publikováno v:
تاریخ اسلام, Vol 19, Iss شماره 3 - پاییز 97 _ مسلسل 75, Pp 111-148 (2018)
One of the functions of history science in the domain of jurisprudence or Fiqh is facilitating the preliminary evaluation of independent reasoning. Muslim scientists are of different view points related to the necessity of Khoms toward the amount of
Externí odkaz:
https://doaj.org/article/630b9ca206554a17b4ba30cdd3eb18fd
Publikováno v:
تاریخ اسلام, Vol 16, Iss شماره 1 - بهار 94 - مسلسل 61, Pp 7-29 (2015)
Following the presentation of analysis pertaining to the constant political tryout of that holiness while considering the spiritual status of Imamate being probably along with extraordinary affairs of hunman, this article has criticized the image of
Externí odkaz:
https://doaj.org/article/d501fd4c246f4e3a95ccf5c25389bb01
Publikováno v:
Dependable Software Engineering. Theories, Tools, and Applications ISBN: 9783031212123
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::04e35311ae0e9c2e581f789e530ed30e
https://doi.org/10.1007/978-3-031-21213-0_14
https://doi.org/10.1007/978-3-031-21213-0_14
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783030584740
CP
CP
In this paper, we present a machine learning based splitting heuristic for divide-and-conquer parallel Boolean SAT solvers. Splitting heuristics, whether they are look-ahead or look-back, are designed using proxy metrics, which when optimized, approx
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::adbdd3ecfd9cc085cba5415ee223e4f0
https://doi.org/10.1007/978-3-030-58475-7_52
https://doi.org/10.1007/978-3-030-58475-7_52
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783319983332
CP
CP
We present an algebraic fault attack (AFA) solver for recovering secret bits from hardware implementations of the SHA family of hash functions. The crucial insight in our method is the use of SHA-based propagation and conflict-analysis methods in the
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::eb59d6b2e937cd9e9ec9d81399824f4c
https://doi.org/10.1007/978-3-319-98334-9_47
https://doi.org/10.1007/978-3-319-98334-9_47
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783319723075
VSTTE
VSTTE
SAT solvers are increasingly being used for cryptanalysis of hash functions and symmetric encryption schemes. Inspired by this trend, we present MapleCrypt which is a SAT solver-based cryptanalysis tool for inverting hash functions. We reduce the has
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::b57dc0a068051cb47ba1db5ecb68c8f7
https://doi.org/10.1007/978-3-319-72308-2_8
https://doi.org/10.1007/978-3-319-72308-2_8
Publikováno v:
ACSCC
We introduce an excess-δ residue representation for residue number system (RNS) arithmetic, in which a flag bit selects one or the other subrange within the full range of n-bit values. We show that our new representation leads to simple modular arit
Autor:
Curtis Bright, Ilias S. Kotsireas, Saeed Nejati, Albert Heinle, Vijay Ganesh, Krzysztof Czarnecki
Publikováno v:
Scopus-Elsevier
Computer Algebra in Scientific Computing ISBN: 9783319456409
CASC
Computer Algebra in Scientific Computing ISBN: 9783319456409
CASC
In this paper we present MathCheck2, a tool which combines sophisticated search procedures of current SAT solvers with domain specific knowledge provided by algorithms implemented in computer algebra systems (CAS). MathCheck2 is aimed to finitely ver
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::015cdbb8fa6f5f12a85420ac53e82116
http://www.scopus.com/inward/record.url?eid=2-s2.0-85016239271&partnerID=MN8TOARS
http://www.scopus.com/inward/record.url?eid=2-s2.0-85016239271&partnerID=MN8TOARS