SubLock: Sub-Circuit Replacement based Input Dependent Key-based Logic Locking for Robust IP Protection [PDF]
Intellectual Property (IP) piracy, overbuilding, reverse engineering, and hardware Trojan are serious security concerns during integrated circuit (IC) development. Logic locking has proven to be a solid defence for mitigating these threats. The existing logic locking techniques are vulnerable to SAT-based attacks.
arxiv
Twin-Field Quantum Key Distribution without Phase Locking [PDF]
Wei Li+13 more
openalex +1 more source
Molecularly Responsive Binding through Co-occupation of Binding Space: A Lock–Key Story [PDF]
Joseph K. Awino, Lan Hu, Yan Zhao
openalex +1 more source
Atmospheric Convection Plays a Key Role in the Climate of Tidally Locked Terrestrial Exoplanets: Insights from High-resolution Simulations [PDF]
Denis E. Sergeev+5 more
openalex +1 more source
Tissue Transglutaminase: Does the Key Fit the Celiac Lock?
Peter M. Gillett, David M. Isreal
openalex +1 more source
Verifying Concurrent Stacks by Divergence-Sensitive Bisimulation
The verification of linearizability -- a key correctness criterion for concurrent objects -- is based on trace refinement whose checking is PSPACE-complete. This paper suggests to use \emph{branching} bisimulation instead.
Katoen, Joost-Pieter+2 more
core
Coarse-grained depletion potentials for anisotropic colloids: Application to lock-and-key systems [PDF]
Clement Law+3 more
openalex +1 more source
The Human Mesenchymal Stem Cells and the Chick Embryo Chorioallantoic Membrane: The Key and the Lock in Revealing Vasculogenesis [PDF]
ŞERBAN COMŞA+4 more
openalex +1 more source
‘Lock and key’ control of optical properties in a push–pull system
Brian J. Jordan+10 more
openalex +2 more sources