{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T23:04:31Z","timestamp":1773615871026,"version":"3.50.1"},"reference-count":13,"publisher":"Allerton Press","issue":"7","license":[{"start":{"date-parts":[[2024,12,1]],"date-time":"2024-12-01T00:00:00Z","timestamp":1733011200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,12,1]],"date-time":"2024-12-01T00:00:00Z","timestamp":1733011200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Aut. Control Comp. Sci."],"published-print":{"date-parts":[[2024,12]]},"DOI":"10.3103\/s0146411624700299","type":"journal-article","created":{"date-parts":[[2025,2,12]],"date-time":"2025-02-12T14:48:44Z","timestamp":1739371724000},"page":"836-852","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["On Simplifying Mixed Boolean-Arithmetic Expressions"],"prefix":"10.3103","volume":"58","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1491-524X","authenticated-orcid":false,"given":"Yu. V.","family":"Kosolapov","sequence":"first","affiliation":[]}],"member":"1627","published-online":{"date-parts":[[2025,2,12]]},"reference":[{"key":"7750_CR1","doi-asserted-by":"publisher","unstructured":"Barak, B., Goldreich, O., Impagliazzo, R., Rudich, S., Sahai, A., Vadhan, S., and Yang, K., On the (im)possibility of obfuscating programs, Advances in Cryptology\u2014CRYPTO 2001, Kilian, J., Ed., Lecture Notes in Computer Science, vol. 2139, Berlin: Springer, 2001, pp. 1\u201318. https:\/\/doi.org\/10.1007\/3-540-44647-8_1","DOI":"10.1007\/3-540-44647-8_1"},{"key":"7750_CR2","doi-asserted-by":"publisher","unstructured":"Zhou, Yo., Main, A., Gu, Yu.X., and Johnson, H., Information hiding in software with mixed Boolean-arithmetic transforms, Information Security Applications, Kim, S., Yung, M., and Lee, H.W., Eds., Lecture Notes in Computer Science, vol. 4867, Berlin: Springer, 2007, pp. 61\u201375. https:\/\/doi.org\/10.1007\/978-3-540-77535-5_5","DOI":"10.1007\/978-3-540-77535-5_5"},{"key":"7750_CR3","doi-asserted-by":"publisher","unstructured":"Gulwani, S., Polozov, O., and Singh, R., Program synthesis, Found. Trends Program. Lang.s, 2017, vol. 4, nos. 1\u20132, pp. 1\u2013119. https:\/\/doi.org\/10.1561\/2500000010","DOI":"10.1561\/2500000010"},{"key":"7750_CR4","doi-asserted-by":"publisher","unstructured":"Reichenwallner, B. and Meerwald-Stadler, P., Efficient deobfuscation of linear mixed Boolean-arithmetic expressions, Proc. 2022 ACM Workshop on Research on Offensive and Defensive Techniques in the Context of Man At The End (MATE) Attacks, Los Angeles, 2022, New York: Association for Computing Machinery, 2022, pp. 19\u201328. https:\/\/doi.org\/10.1145\/3560831.3564256","DOI":"10.1145\/3560831.3564256"},{"key":"7750_CR5","volume-title":"Mathematical aspects of program obfuscation, PhD Dissertation","author":"L. Zobernig","year":"2020","unstructured":"Zobernig, L., Mathematical aspects of program obfuscation, PhD Dissertation, Auckland, New Zealand: Univ. of Auckland, 2020. http:\/\/hdl.handle.net\/2292\/53400."},{"key":"7750_CR6","doi-asserted-by":"publisher","unstructured":"Garba, P. and Favaro, M., SATURN\u2013Software deobfuscation framework based on LLVM, Proc. 3rd ACM Workshop on Software Protection, London, 2019, New York: Association for Computing Machinery, 2019, pp. 27\u201338. https:\/\/doi.org\/10.1145\/3338503.3357721","DOI":"10.1145\/3338503.3357721"},{"key":"7750_CR7","unstructured":"Eyrolles, N., Obfuscation with mixed Boolean-arithmetic expressions: Reconstruction, analysis and simplification tools, PhD Dissertation, Paris: Univ. Paris-Saclay, 2017."},{"key":"7750_CR8","doi-asserted-by":"publisher","unstructured":"Xu, D., Liu, B., Feng, W., Ming, J., Zheng, Q., Li, J., and Yu, Q., Boosting SMT solver performance on mixed-bitwise-arithmetic expressions, Proc. 42nd ACM SIGPLAN Int. Conf. on Programming Language Design and Implementation, New York: Association for Computing Machinery, 2021, pp. 651\u2013664. https:\/\/doi.org\/10.1145\/3453483.3454068","DOI":"10.1145\/3453483.3454068"},{"key":"7750_CR9","volume-title":"MBA-Blast: Unveiling and simplifying mixed Boolean-arithmetic obfuscation, 30th USENIX Security Symp. (USENIX Security 21)","author":"B. Liu","year":"2021","unstructured":"Liu, B., Shen, J., Ming, J., Zheng, Q., Li, J., and Xu, D., MBA-Blast: Unveiling and simplifying mixed Boolean-arithmetic obfuscation, 30th USENIX Security Symp. (USENIX Security 21), USENIX Association, 2021, pp.\u00a01701\u20131718. https:\/\/www.usenix.org\/conference\/usenixsecurity21\/presentation\/liu-binbin."},{"key":"7750_CR10","doi-asserted-by":"publisher","first-page":"384","DOI":"10.1109\/tit.1978.1055873","volume":"24","author":"E. Berlekamp","year":"1978","unstructured":"Berlekamp, E., McEliece, R., and Van Tilborg, H., On the inherent intractability of certain coding problems (Corresp.), IEEE Trans. Inf. Theory, 1978, vol. 24, no. 3, pp. 384\u2013386. https:\/\/doi.org\/10.1109\/tit.1978.1055873","journal-title":"IEEE Trans. Inf. Theory"},{"key":"7750_CR11","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1109\/tit.1962.1057777","volume":"8","author":"E. Prange","year":"1962","unstructured":"Prange, E., The use of information sets in decoding cyclic codes, IEEE Trans. Inf. Theory, 1962, vol. 8, no. 5, pp. 5\u20139. https:\/\/doi.org\/10.1109\/tit.1962.1057777","journal-title":"IEEE Trans. Inf. Theory"},{"key":"7750_CR12","doi-asserted-by":"publisher","unstructured":"Peters, Ch., Information-set decoding for linear codes over F\n               q, Post-Quantum Cryptography, Sendrier, N., Ed., Lecture Notes in Computer Science, vol. 6061, Berlin: Springer, 2010, pp. 81\u201394. https:\/\/doi.org\/10.1007\/978-3-642-12929-2_7","DOI":"10.1007\/978-3-642-12929-2_7"},{"key":"7750_CR13","doi-asserted-by":"publisher","unstructured":"Weger, V., Gassner, N., and Rosenthal, J., A survey on code-based cryptography, arXiv Preprint, 2022. https:\/\/doi.org\/10.48550\/arXiv.2201.07119","DOI":"10.48550\/arXiv.2201.07119"}],"container-title":["Automatic Control and Computer Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411624700299.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.3103\/S0146411624700299","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411624700299.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T22:05:57Z","timestamp":1773612357000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.3103\/S0146411624700299"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12]]},"references-count":13,"journal-issue":{"issue":"7","published-print":{"date-parts":[[2024,12]]}},"alternative-id":["7750"],"URL":"https:\/\/doi.org\/10.3103\/s0146411624700299","relation":{},"ISSN":["0146-4116","1558-108X"],"issn-type":[{"value":"0146-4116","type":"print"},{"value":"1558-108X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,12]]},"assertion":[{"value":"3 April 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 May 2023","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 May 2023","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 February 2025","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The author of this work declares that he has no conflicts of interest.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"CONFLICT OF INTEREST"}}]}}