Results 31 to 40 of about 462,135 (294)
In this paper, we introduce the Satisfiability Modulo Theory (SMT) attack on obfuscated circuits. The proposed attack is the superset of Satisfiability (SAT) attack, with many additional features.
Kimia Zamiri Azar +3 more
doaj +1 more source
A Method for Identifying Critical Elements of a Cyber-Physical System Under Data Attack
In this paper, we use hyper-network methods to identify the critical elements of a cyber-physical system (CPS) under data attack according to IEC 61850.
Youping Fan, Jingjiao Li, Dai Zhang
doaj +1 more source
Garbled Circuits from an SCA Perspective
Garbling schemes, invented in the 80’s by Yao (FOCS’86), have been a versatile and fundamental tool in modern cryptography. A prominent application of garbled circuits is constant round secure two-party computation, which led to a long line of study of ...
Itamar Levi, Carmit Hazay
doaj +1 more source
Applying Grover's algorithm to AES: quantum resource estimates
We present quantum circuits to implement an exhaustive key search for the Advanced Encryption Standard (AES) and analyze the quantum resources required to carry out such an attack.
A Barenco +17 more
core +1 more source
Logical limits of abstract argumentation frameworks [PDF]
International audienceDung’s (1995) argumentation framework takes as input two abstract entities: a set of arguments and a binary relation encoding attacks between these arguments. It returns acceptable sets of arguments, called extensions, w.r.t.
Amgoud, Leila, Besnard, Philippe
core +3 more sources
A logic obfuscation attack method based on gate-level information flow tracing techniques
Logical obfuscation technique is a mainstream technical means to achieve intellectual property protection and prevent reverse engineering. In this paper, we propose a logical obfuscation attack method based on the gate-level information flow tracking ...
LIU Liang +5 more
doaj +1 more source
Functional Connectivity Linked to Cognitive Recovery After Minor Stroke
ABSTRACT Objective Patients with minor stroke exhibit slowed processing speed and generalized alterations in functional connectivity involving frontoparietal cortex (FPC). The pattern of connectivity evolves over time. In this study, we examine the relationship of functional connectivity patterns to cognitive performance, to determine ...
Vrishab Commuri +7 more
wiley +1 more source
Side Channel Attack-Aware Resource Allocation for URLLC and eMBB Slices in 5G RAN
Network slicing is a key enabling technology to realize the provisioning of customized services in 5G paradigm. Due to logical isolation instead of physical isolation, network slicing is facing a series of security issues.
Yajie Li +5 more
doaj +1 more source
Estimating the cost of generic quantum pre-image attacks on SHA-2 and SHA-3 [PDF]
We investigate the cost of Grover's quantum search algorithm when used in the context of pre-image attacks on the SHA-2 and SHA-3 families of hash functions.
Amy, Matthew +5 more
core +1 more source
Attacks on Java Card 3.0 Combining Fault and Logical Attacks [PDF]
Java Cards have been threatened so far by attacks using ill-formed applications which assume that the application bytecode is not verified. This assumption remained realistic as long as the bytecode verifier was commonly executed off-card and could thus be bypassed.
Guillaume Barbu +2 more
openaire +1 more source

