Results 141 to 150 of about 6,293,788 (277)

SubLock: Sub-Circuit Replacement based Input Dependent Key-based Logic Locking for Robust IP Protection [PDF]

open access: yesarXiv
Intellectual Property (IP) piracy, overbuilding, reverse engineering, and hardware Trojan are serious security concerns during integrated circuit (IC) development. Logic locking has proven to be a solid defence for mitigating these threats. The existing logic locking techniques are vulnerable to SAT-based attacks.
arxiv  

Twin-Field Quantum Key Distribution without Phase Locking [PDF]

open access: green, 2023
Wei Li   +13 more
openalex   +1 more source

Tissue Transglutaminase: Does the Key Fit the Celiac Lock?

open access: bronze, 2000
Peter M. Gillett, David M. Isreal
openalex   +1 more source

Verifying Concurrent Stacks by Divergence-Sensitive Bisimulation

open access: yes
The verification of linearizability -- a key correctness criterion for concurrent objects -- is based on trace refinement whose checking is PSPACE-complete. This paper suggests to use \emph{branching} bisimulation instead.
Katoen, Joost-Pieter   +2 more
core  

‘Lock and key’ control of optical properties in a push–pull system

open access: green, 2008
Brian J. Jordan   +10 more
openalex   +2 more sources

Home - About - Disclaimer - Privacy