K-Gate Lock: Multi-Key Logic Locking Using Input Encoding Against Oracle-Guided Attacks [PDF]
Logic locking has emerged to prevent piracy and overproduction of integrated circuits ever since the split of the design house and manufacturing foundry was established. While there has been a lot of research using a single global key to lock the circuit, even the most sophisticated single-key locking methods have been shown to be vulnerable to ...
Kevin Lopez, Amin Rezaei
arxiv +3 more sources
Molecular Docking: From Lock and Key to Combination Lock.
Accurate modeling of protein ligand binding is an important step in structure-based drug design, is a useful starting point for finding new lead compounds or drug candidates. The 'Lock and Key' concept of protein-ligand binding has dominated descriptions
A. Tripathi, V. Bankaitis
semanticscholar +3 more sources
Cute-Lock: Behavioral and Structural Multi-Key Logic Locking Using Time Base Keys [PDF]
The outsourcing of semiconductor manufacturing raises security risks, such as piracy and overproduction of hardware intellectual property. To overcome this challenge, logic locking has emerged to lock a given circuit using additional key bits. While single-key logic locking approaches have demonstrated serious vulnerability to a wide range of attacks ...
Kevin López, Amin Rezaei
arxiv +3 more sources
A DNA dual lock-and-key strategy for cell-subtype-specific siRNA delivery
Delivery of siRNA to target cells is essential for in vivogene therapy. Here the authors demonstrate an oligonucleotide aptamer that targets therapeutic siRNA to a specific cell type.
Kewei Ren+6 more
doaj +2 more sources
Effect of spin-lock frequency on quantitative myocardial T1ρ mapping [PDF]
Objectives To use T1ρ mapping to assess myocardial fibrosis and to provide a reference for future clinical application, it is necessary to understand the factors influencing T1ρ values.
Caiyun Han+13 more
doaj +2 more sources
Key-lock mechanism in nematic colloidal dispersions. [PDF]
We consider the interaction between two-dimensional nematic colloids and planar or sculpted walls. The elastic interaction between colloidal disks and flat walls, with homeotropic boundary conditions, is always repulsive.
N. Silvestre+3 more
semanticscholar +3 more sources
Precise recognition of benzonitrile derivatives with supramolecular macrocycle of phosphorylated cavitand by co-crystallization method [PDF]
The importance of molecular docking in drug discovery lies in the precise recognition between potential drug compounds and their target receptors, which is generally based on the computational method.
Heng Li+4 more
doaj +2 more sources
Gradient Leakage Defense with Key-Lock Module for Federated Learning [PDF]
Federated Learning (FL) is a widely adopted privacy-preserving machine learning approach where private data remains local, enabling secure computations and the exchange of local model gradients between local clients and third-party parameter servers ...
Hanchi Ren+4 more
semanticscholar +1 more source
A Secure Scan Architecture Protecting Scan Test and Scan Dump Using Skew-Based Lock and Key
Scan-based Design for Testability (DFT) is widely used in industry as it consistently provides high fault coverage. However, scan-based DFT is prone to security vulnerabilities where attackers use the scan design to obtain secret information from the ...
Hyungil Woo, Seokjun Jang, Sungho Kang
doaj +1 more source
Conventional cyanine dyes with a symmetric structure are "always-on", which can easily accumulate in the liver and display high liver background fluorescence, inevitably interfering the accurate diagnosis and therapy in extrahepatic diseases.
Yang Tian+6 more
semanticscholar +1 more source