Logic synthesis is a fundamental step in the realization of modern integrated circuits. It has traditionally been employed for the optimization of CMOS-based designs, as well as for emerging technologies and quantum computing. Recently, it found application in minimizing the number of AND gates in cryptography benchmarks represented as xor-and graphs (XAGs). The number of AND gates in an XAG, which is called the logic network’s multiplicative complexity, plays a critical role in various cryptography and security protocols such as fully homomorphic encryption (FHE) and secure multi-party computation (MPC). Further, the number of AND gates is also important to assess the degree of vulnerability of a Boolean function, and influences the cost o...
Abstract. One of the hardest problems in computer science is the problem of gate-efficient implement...
Many information-theoretic secure protocols are known for general secure multi-party computation, in...
Secure computation protocols enable mutually distrusting parties to compute a function of their priv...
XOR-AND Graphs (XAGs) are an enrichment of the classical AND-Inverter Graphs (AIGs) with XOR nodes. ...
Given a set of logic primitives and a Boolean function, exact synthesis finds the optimum representa...
The multiplicative complexity of a Boolean function is the minimum number of AND gates (i.e., multip...
Although contemporary logic synthesis performs well on random logic, it may produce subpar results i...
The multiplicative complexity of a Boolean function is the minimum number of AND gates (i.e., multip...
We present a new logic synthesis methodology, called MIXSyn, that produces area-efficient results fo...
Typical operators for the decomposition of Boolean functions in state-of-the-art algorithms are AND,...
We present a constructive method to create quantum circuits that implement oracles |x〉|y〉|0〉 k →|x〉|...
The efficient synthesis of circuits is a well-studied problem. Due to the NP-hardness of the problem...
Emerging reconfigurable nanotechnologies allow the implementation of self-dual functions with a fewe...
The new Field Programmable Gate Array (FPGA) technologies and their structures have opened up new ap...
In this work we propose a multi-start heuristic which aims at minimizing the multiplicative depth of...
Abstract. One of the hardest problems in computer science is the problem of gate-efficient implement...
Many information-theoretic secure protocols are known for general secure multi-party computation, in...
Secure computation protocols enable mutually distrusting parties to compute a function of their priv...
XOR-AND Graphs (XAGs) are an enrichment of the classical AND-Inverter Graphs (AIGs) with XOR nodes. ...
Given a set of logic primitives and a Boolean function, exact synthesis finds the optimum representa...
The multiplicative complexity of a Boolean function is the minimum number of AND gates (i.e., multip...
Although contemporary logic synthesis performs well on random logic, it may produce subpar results i...
The multiplicative complexity of a Boolean function is the minimum number of AND gates (i.e., multip...
We present a new logic synthesis methodology, called MIXSyn, that produces area-efficient results fo...
Typical operators for the decomposition of Boolean functions in state-of-the-art algorithms are AND,...
We present a constructive method to create quantum circuits that implement oracles |x〉|y〉|0〉 k →|x〉|...
The efficient synthesis of circuits is a well-studied problem. Due to the NP-hardness of the problem...
Emerging reconfigurable nanotechnologies allow the implementation of self-dual functions with a fewe...
The new Field Programmable Gate Array (FPGA) technologies and their structures have opened up new ap...
In this work we propose a multi-start heuristic which aims at minimizing the multiplicative depth of...
Abstract. One of the hardest problems in computer science is the problem of gate-efficient implement...
Many information-theoretic secure protocols are known for general secure multi-party computation, in...
Secure computation protocols enable mutually distrusting parties to compute a function of their priv...