1

ECC's Achilles'Heel: Unveiling Weak Keys in Standardized Curves

The strength of Elliptic curve cryptography (ECC) relies on curve choice. This work analyzes weak keys in standardized curves, i.e., private keys within small subgroups of the auxiliary group ℤ∗p. We quantify weak key prevalence across standardized …

Netstaldi: A Modular Distributed Architecture for Incremental Network Discovery

Maintaining a comprehensive understanding of a network's connected devices is fundamental for robust security. This knowledge is crucial for tasks like vulnerability assessments, identifying potential attack surfaces, and network mapping. In this …

The Rational Construction of a Wheeler DFA

Deterministic Finite Wheeler Automata are a natural generalisation to regular languages of the theory of compressed data structures originated by the introduction of the Burrows-Wheeler transform. Indeed, if we can find a Wheeler automaton …

A Linear-size Cascade Decomposition for Wheeler Automata

The Krohn-Rhodes Decomposition Theorem (KRDT) is a central result in automata and semigroup theories: it states that any (deterministic) finite-state automaton can be disassembled into a collection of automata of two simple types, that can be …

Adaptive Directions for Bernstein-Based Polynomial Set Evolution

An ASP Approach for the Synthesis of CNOT Minimal Quantum Circuits

In the last year, physical working Quantum Computers have been built and made available for the end users. Such devices, working under the rules of Quantum Mechanics, can only apply a finite set of one/two qubit operations that form a universal set …

An xAI Approach for Data-to-Text Processing with ASP

The generation of natural language text from data series gained renewed interest among AI research goals. Not surprisingly, the few proposals in the state of the art are based on training some system, in order to produce a text that describes and …

Assembling Coherent Network Topologies Using Round-Trip Graphs (short paper)

Discovering the network topology in computer networks is challenging due to limited communication and incomplete information about non-immediately connected nodes. In this paper we address the problem of assembling partial views obtained by discovery …

Constraint Propagation on GPU: A Case Study for the Cumulative Constraint

Continued Hereditarily Finite Set-Approximations

We study an encoding RA that assigns a real number to each hereditarily finite set, in a broad sense. In particular, we investigate whether the map RA can be used to produce codes that approximate any positive real number to arbitrary precision, in a …