Skip to main content

Showing 1–20 of 20 results for author: Limaye, N

Searching in archive cs. Search in all archives.
.
  1. arXiv:2302.06984  [pdf, ps, other

    cs.CC

    Towards Optimal Depth-Reductions for Algebraic Formulas

    Authors: Hervé Fournier, Nutan Limaye, Guillaume Malod, Srikanth Srinivasan, Sébastien Tavenas

    Abstract: Classical results of Brent, Kuck and Maruyama (IEEE Trans. Computers 1973) and Brent (JACM 1974) show that any algebraic formula of size s can be converted to one of depth O(log s) with only a polynomial blow-up in size. In this paper, we consider a fine-grained version of this result depending on the degree of the polynomial computed by the algebraic formula. Given a homogeneous algebraic formula… ▽ More

    Submitted 14 February, 2023; originally announced February 2023.

  2. arXiv:2209.01711  [pdf, other

    cs.CR cs.AR

    Hide & Seek: Seeking the (Un)-Hidden key in Provably-Secure Logic Locking Techniques

    Authors: Satwik Patnaik, Nimisha Limaye, Ozgur Sinanoglu

    Abstract: Logic locking protects an IC from threats such as piracy of design IP and unauthorized overproduction throughout the IC supply chain. Out of the several techniques proposed by the research community, provably-secure logic locking (PSLL) has acquired a foothold due to its algorithmic and provable-security guarantees. However, the security of these techniques is questioned by attackers that exploit… ▽ More

    Submitted 4 September, 2022; originally announced September 2022.

    Comments: To Appear in IEEE Transactions on Information Forensics and Security (TIFS), 2022

  3. arXiv:2006.06806  [pdf, other

    cs.CR

    Benchmarking at the Frontier of Hardware Security: Lessons from Logic Locking

    Authors: Benjamin Tan, Ramesh Karri, Nimisha Limaye, Abhrajit Sengupta, Ozgur Sinanoglu, Md Moshiur Rahman, Swarup Bhunia, Danielle Duvalsaint, R. D., Blanton, Amin Rezaei, Yuanqi Shen, Hai Zhou, Leon Li, Alex Orailoglu, Zhaokun Han, Austin Benedetti, Luciano Brignone, Muhammad Yasin, Jeyavijayan Rajendran, Michael Zuzak, Ankur Srivastava, Ujjwal Guin, Chandan Karfa, Kanad Basu , et al. (11 additional authors not shown)

    Abstract: Integrated circuits (ICs) are the foundation of all computing systems. They comprise high-value hardware intellectual property (IP) that are at risk of piracy, reverse-engineering, and modifications while making their way through the geographically-distributed IC supply chain. On the frontier of hardware security are various design-for-trust techniques that claim to protect designs from untrusted… ▽ More

    Submitted 11 June, 2020; originally announced June 2020.

  4. arXiv:2001.06724  [pdf, other

    cs.CR

    DynUnlock: Unlocking Scan Chains Obfuscated using Dynamic Keys

    Authors: Nimisha Limaye, Ozgur Sinanoglu

    Abstract: Outsourcing in semiconductor industry opened up venues for faster and cost-effective chip manufacturing. However, this also introduced untrusted entities with malicious intent, to steal intellectual property (IP), overproduce the circuits, insert hardware Trojans, or counterfeit the chips. Recently, a defense is proposed to obfuscate the scan access based on a dynamic key that is initially generat… ▽ More

    Submitted 18 January, 2020; originally announced January 2020.

    Comments: Accepted at Design, Automation and Test in Europe Conference (DATE) 2020

  5. arXiv:1911.12520  [pdf, ps, other

    cs.CC cs.DM cs.SC

    Schur Polynomials do not have small formulas if the Determinant doesn't!

    Authors: Prasad Chaugule, Mrinal Kumar, Nutan Limaye, Chandra Kanta Mohapatra, Adrian She, Srikanth Srinivasan

    Abstract: Schur Polynomials are families of symmetric polynomials that have been classically studied in Combinatorics and Algebra alike. They play a central role in the study of Symmetric functions, in Representation theory [Sta99], in Schubert calculus [LM10] as well as in Enumerative combinatorics [Gas96, Sta84, Sta99]. In recent years, they have also shown up in various incarnations in Computer Science,… ▽ More

    Submitted 27 November, 2019; originally announced November 2019.

  6. arXiv:1909.04428  [pdf, other

    cs.CR

    ScanSAT: Unlocking Static and Dynamic Scan Obfuscation

    Authors: Lilas Alrahis, Muhammad Yasin, Nimisha Limaye, Hani Saleh, Baker Mohammad, Mahmoud Al-Qutayri, Ozgur Sinanoglu

    Abstract: While financially advantageous, outsourcing key steps, such as testing, to potentially untrusted Outsourced Assembly and Test (OSAT) companies may pose a risk of compromising on-chip assets. Obfuscation of scan chains is a technique that hides the actual scan data from the untrusted testers; logic inserted between the scan cells, driven by a secret key, hides the transformation functions that map… ▽ More

    Submitted 10 September, 2019; originally announced September 2019.

    Comments: 16 pages, 14 figures, IEEE Transactions on Emerging Topics in Computing

  7. arXiv:1906.07806  [pdf, other

    cs.CR

    Is Robust Design-for-Security Robust Enough? Attack on Locked Circuits with Restricted Scan Chain Access

    Authors: Nimisha Limaye, Abhrajit Sengupta, Mohammed Nabeel, Ozgur Sinanoglu

    Abstract: The security of logic locking has been called into question by various attacks, especially a Boolean satisfiability (SAT) based attack, that exploits scan access in a working chip. Among other techniques, a robust design-for-security (DFS) architecture was presented to restrict any unauthorized scan access, thereby, thwarting the SAT attack (or any other attack that relies on scan access). Neverth… ▽ More

    Submitted 18 June, 2019; originally announced June 2019.

    Comments: To be published in IEEE/ACM International Conference on Computer-Aided Design (ICCAD) 2019

  8. arXiv:1809.05932  [pdf, ps, other

    cs.CC

    A #SAT Algorithm for Small Constant-Depth Circuits with PTF gates

    Authors: Swapnam Bajpai, Vaibhav Krishan, Deepanshu Kush, Nutan Limaye, Srikanth Srinivasan

    Abstract: We show that there is a randomized algorithm that, when given a small constant-depth Boolean circuit $C$ made up of gates that compute constant-degree Polynomial Threshold functions or PTFs (i.e., Boolean functions that compute signs of constant-degree polynomials), counts the number of satisfying assignments to $C$ in significantly better than brute-force time. Formally, for any constants… ▽ More

    Submitted 16 September, 2018; originally announced September 2018.

  9. arXiv:1809.04092  [pdf, ps, other

    cs.CC

    A Fixed-Depth Size-Hierarchy Theorem for AC$^0[\oplus]$ via the Coin Problem

    Authors: Nutan Limaye, Karteek Sreenivasaiah, Srikanth Srinivasan, Utkarsh Tripathi, S. Venkitesh

    Abstract: We prove the first Fixed-depth Size-hierarchy Theorem for uniform AC$^0[\oplus]$ circuits; in particular, for fixed $d$, the class $\mathcal{C}_{d,k}$ of uniform AC$^0[\oplus]$ formulas of depth $d$ and size $n^k$ form an infinite hierarchy. For this, we find the first class of explicit functions giving (up to polynomial factor) matching upper and lower bounds for AC$^0[\oplus]$ formulas, derived… ▽ More

    Submitted 20 February, 2019; v1 submitted 11 September, 2018; originally announced September 2018.

  10. arXiv:1804.02520  [pdf, ps, other

    cs.CC

    A Near-Optimal Depth-Hierarchy Theorem for Small-Depth Multilinear Circuits

    Authors: Suryajith Chillara, Christian Engels, Nutan Limaye, Srikanth Srinivasan

    Abstract: We study the size blow-up that is necessary to convert an algebraic circuit of product-depth $Δ+1$ to one of product-depth $Δ$ in the multilinear setting. We show that for every positive $Δ= Δ(n) = o(\log n/\log \log n),$ there is an explicit multilinear polynomial $P^{(Δ)}$ on $n$ variables that can be computed by a multilinear formula of product-depth $Δ+1$ and size $O(n)$, but not by any mult… ▽ More

    Submitted 7 April, 2018; originally announced April 2018.

  11. arXiv:1710.05481  [pdf, ps, other

    cs.CC

    Small-depth Multilinear Formula Lower Bounds for Iterated Matrix Multiplication, with Applications

    Authors: Suryajith Chillara, Nutan Limaye, Srikanth Srinivasan

    Abstract: In this paper, we study the algebraic formula complexity of multiplying $d$ many $2\times 2$ matrices, denoted $\mathrm{IMM}_{d}$, and show that the well-known divide-and-conquer algorithm cannot be significantly improved at any depth, as long as the formulas are multilinear. Formally, for each depth $Δ\leq \log d$, we show that any product-depth $Δ$ multilinear formula for $\mathrm{IMM}_d$ must… ▽ More

    Submitted 15 October, 2017; originally announced October 2017.

  12. arXiv:1510.02393  [pdf, ps, other

    cs.FL

    Value Automata with Filters

    Authors: Michaël Cadilhac, Andreas Krebs, Nutan Limaye

    Abstract: We propose to study value automata with filters, a natural generalization of regular cost automata to nondeterminism. Models such as weighted automata and Parikh automata appear naturally as specializations. Results on the expressiveness of this model offer a general understanding of the behavior of the models that arise as special cases. A landscape of such restrictions is drawn.

    Submitted 8 October, 2015; originally announced October 2015.

    Comments: 8 pages, presented in the short track of NCMA'15, work in progress

    MSC Class: 68Q45; 68Q60

  13. arXiv:1401.2518  [pdf, other

    cs.DC cs.DS

    Optimal Embedding of Functions for In-Network Computation: Complexity Analysis and Algorithms

    Authors: Pooja Vyavahare, Nutan Limaye, D. Manjunath

    Abstract: We consider optimal distributed computation of a given function of distributed data. The input (data) nodes and the sink node that receives the function form a connected network that is described by an undirected weighted network graph. The algorithm to compute the given function is described by a weighted directed acyclic graph and is called the computation graph. An embedding defines the computa… ▽ More

    Submitted 14 July, 2015; v1 submitted 11 January, 2014; originally announced January 2014.

  14. arXiv:1307.4897  [pdf, other

    cs.CC

    Small Depth Proof Systems

    Authors: Andreas Krebs, Nutan Limaye, Meena Mahajan, Karteek Sreenivasaiah

    Abstract: A proof system for a language L is a function f such that Range(f) is exactly L. In this paper, we look at proofsystems from a circuit complexity point of view and study proof systems that are computationally very restricted. The restriction we study is: they can be computed by bounded fanin circuits of constant depth (NC^0), or of O(log log n) depth but with O(1) alternations (polylog AC^0). Each… ▽ More

    Submitted 18 July, 2013; originally announced July 2013.

    Comments: 19 pages, 1 figure. To appear in MFCS 2013

    ACM Class: F.2.2; F.1.3; F.1.2

  15. arXiv:1210.6134  [pdf, ps, other

    cs.NI cs.DC

    In-Network Estimation of Frequency Moments

    Authors: Pooja Vyavahare, Nutan Limaye, D. Manjunath

    Abstract: We consider the problem of estimating functions of distributed data using a distributed algorithm over a network. The extant literature on computing functions in distributed networks such as wired and wireless sensor networks and peer-to-peer networks deals with computing linear functions of the distributed data when the alphabet size of the data values is small, O(1). We describe a distributed ra… ▽ More

    Submitted 23 October, 2012; originally announced October 2012.

  16. arXiv:1206.0206  [pdf, ps, other

    cs.CC

    Streaming algorithms for recognizing nearly well-parenthesized expressions

    Authors: Andreas Krebs, Nutan Limaye, Srikanth Srinivasan

    Abstract: We study the streaming complexity of the membership problem of 1-turn-Dyck2 and Dyck2 when there are a few errors in the input string. 1-turn-Dyck2 with errors: We prove that there exists a randomized one-pass algorithm that given x checks whether there exists a string x' in 1-turn-Dyck2 such that x is obtained by flip** at most $k$ locations of x' using: - O(k log n) space, O(k log n) rando… ▽ More

    Submitted 1 June, 2012; originally announced June 2012.

  17. arXiv:1104.0848  [pdf, ps, other

    cs.DS cs.FL

    Streaming algorithms for language recognition problems

    Authors: Ajesh Babu, Nutan Limaye, Jaikumar Radhakrishnan, Girish Varma

    Abstract: We study the complexity of the following problems in the streaming model. Membership testing for \DLIN We show that every language in \DLIN\ can be recognised by a randomized one-pass $O(\log n)$ space algorithm with inverse polynomial one-sided error, and by a deterministic p-pass $O(n/p)$ space algorithm. We show that these algorithms are optimal. Membership testing for \LL$(k)$ For language… ▽ More

    Submitted 5 April, 2011; originally announced April 2011.

  18. arXiv:0809.2319  [pdf, ps, other

    cs.CC

    A Log-space Algorithm for Canonization of Planar Graphs

    Authors: Samir Datta, Nutan Limaye, Prajakta Nimbhorkar, Thomas Thierauf, Fabian Wagner

    Abstract: Graph Isomorphism is the prime example of a computational problem with a wide difference between the best known lower and upper bounds on its complexity. We bridge this gap for a natural and important special case, planar graph isomorphism, by presenting an upper bound that matches the known logspace hardness [Lindell'92]. In fact, we show the formally stronger result that planar graph canonizat… ▽ More

    Submitted 30 January, 2009; v1 submitted 15 September, 2008; originally announced September 2008.

  19. arXiv:0806.1041  [pdf, ps, other

    cs.CC

    3-connected Planar Graph Isomorphism is in Log-space

    Authors: Samir Datta, Nutan Limaye, Prajakta Nimbhorkar

    Abstract: We show that the isomorphism of 3-connected planar graphs can be decided in deterministic log-space. This improves the previously known bound UL$\cap$coUL of Thierauf and Wagner.

    Submitted 5 June, 2008; originally announced June 2008.

  20. arXiv:0802.1699  [pdf, ps, other

    cs.CC

    Longest paths in Planar DAGs in Unambiguous Logspace

    Authors: Nutan Limaye, Meena Mahajan, Prajakta Nimbhorkar

    Abstract: We show via two different algorithms that finding the length of the longest path in planar directed acyclic graph (DAG) is in unambiguous logspace UL, and also in the complement class co-UL. The result extends to toroidal DAGs as well.

    Submitted 12 February, 2008; originally announced February 2008.