Results 1 to 10 of about 400,569 (282)

Anti-SAT: Mitigating SAT Attack on Logic Locking [PDF]

open access: yesIEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 2019
Logic locking is a technique that is proposed to protect outsourced IC designs from piracy and counterfeiting by untrusted foundries. A locked IC preserves the correct functionality only when a correct key is provided. Recently, the security of logic locking is threatened by a new attack called SAT attack, which can decipher the correct key of most ...
Yang Xie, Ankur Srivastava
exaly   +5 more sources

On Cryptographic Attacks Using Backdoors for SAT

open access: yesProceedings of the AAAI Conference on Artificial Intelligence, 2018
Propositional satisfiability (SAT) is at the nucleus of state-of-the-art approaches to a variety of computationally hard problems, one of which is cryptanalysis. Moreover, a number of practical applications of SAT can only be tackled efficiently by identifying and exploiting a subset of formula's variables called backdoor set (or simply
Semenov, Alexander   +4 more
openaire   +4 more sources

SMT Attack: Next Generation Attack on Obfuscated Circuits with Capabilities and Performance Beyond the SAT Attacks

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2018
In this paper, we introduce the Satisfiability Modulo Theory (SMT) attack on obfuscated circuits. The proposed attack is the superset of Satisfiability (SAT) attack, with many additional features.
Kimia Zamiri Azar   +3 more
doaj   +3 more sources

Novel defense based on softmax activation transformation

open access: yes网络与信息安全学报, 2022
Deep learning is widely used in various fields such as image processing, natural language processing, network mining and so on.However, it is vulnerable to malicious adversarial attacks and many defensive methods have been proposed accordingly.Most ...
Jinyin CHEN, Changan WU, Haibin ZHENG
doaj   +3 more sources

Fun-SAT: Functional Corruptibility-Guided SAT-Based Attack on Sequential Logic Encryption [PDF]

open access: yes2021 IEEE International Symposium on Hardware Oriented Security and Trust (HOST), 2021
Accepted at IEEE International Symposium on Hardware Oriented Security and Trust (HOST ...
Hu, Yinghua   +5 more
openaire   +2 more sources

Automatic Preimage Attack Framework on Ascon Using a Linearize-and-Guess Approach

open access: yesIACR Transactions on Symmetric Cryptology, 2023
Ascon is the final winner of the lightweight cryptography standardization competition (2018 − 2023). In this paper, we focus on preimage attacks against round-reduced Ascon.
Huina Li   +4 more
doaj   +1 more source

Breaking CAS-Lock and Its Variants by Exploiting Structural Traces

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2021
Logic locking is a prominent solution to protect against design intellectual property theft. However, there has been a decade-long cat-and-mouse game between defenses and attacks. A turning point in logic locking was the development of miterbased Boolean
Abhrajit Sengupta   +2 more
doaj   +1 more source

Automating Collision Attacks on RIPEMD-160

open access: yesIACR Transactions on Symmetric Cryptology, 2023
As an ISO/IEC standard, the hash function RIPEMD-160 has been used to generate the Bitcoin address with SHA-256. However, due to the complex doublebranch structure of RIPEMD-160, the best collision attack only reaches 36 out of 80 steps of RIPEMD-160 ...
Yingxin Li, Fukang Liu, Gaoli Wang
doaj   +1 more source

Addendum to Linear Cryptanalyses of Three AEADs with GIFT-128 as Underlying Primitives

open access: yesIACR Transactions on Symmetric Cryptology, 2022
In ToSC 2021(2), Sun et al. implemented an automatic search with the Boolean satisfiability problem (SAT) method on GIFT-128 and identified a 19-round linear approximation with the expected linear potential being 2−117.43, which is utilised to launch a ...
Ling Sun, Wei Wang, Meiqin Wang
doaj   +1 more source

Accelerating the Search of Differential and Linear Characteristics with the SAT Method

open access: yesIACR Transactions on Symmetric Cryptology, 2021
The introduction of the automatic search boosts the cryptanalysis of symmetric-key primitives to some degree. However, the performance of the automatic search is not always satisfactory for the search of long trails or ciphers with large state sizes ...
Ling Su, Wei Wang, Meiqin Wang
doaj   +1 more source

Home - About - Disclaimer - Privacy