Results 31 to 40 of about 400,569 (282)

Advancing Hardware Security Using Polymorphic and Stochastic Spin-Hall Effect Devices

open access: yes, 2018
Protecting intellectual property (IP) in electronic circuits has become a serious challenge in recent years. Logic locking/encryption and layout camouflaging are two prominent techniques for IP protection.
amarù   +6 more
core   +1 more source

Dynamic deployment of context-aware access control policies for constrained security devices [PDF]

open access: yes, 2009
Securing the access to a server, guaranteeing a certain level of protection over an encrypted communication channel, executing particular counter measures when attacks are detected are examples of security requirements.
Cuppens, Frederic   +4 more
core   +1 more source

Using Linearizing Sets to Solve Multivariate Quadratic Equations in Algebraic Cryptanalysis

open access: yesIEEE Access, 2023
In this paper we describe a class of cryptographic guess-and-determine attacks which is based on the notion of a linearizing set. A linearizing set-based attack is applied to a system of Multivariate Quadratic equations (MQ) over $GF(2)$ field, which ...
Alexander Semenov   +3 more
doaj   +1 more source

Detection of Sensor Attack and Resilient State Estimation for Uniformly Observable Nonlinear Systems having Redundant Sensors

open access: yes, 2018
This paper presents a detection algorithm for sensor attacks and a resilient state estimation scheme for a class of uniformly observable nonlinear systems. An adversary is supposed to corrupt a subset of sensors with the possibly unbounded signals, while
Eun, Yongsoon   +4 more
core   +1 more source

Integrated cost-benefit analysis of tsetse control and herd productivity to inform control programs for animal African trypanosomiasis [PDF]

open access: yes, 2018
Animal African trypanosomiasis (AAT) and its tsetse vector are responsible for annual losses estimated in billions of US dollars ($). Recent years have seen the implementation of a series of multinational interventions.
Chilongo, K   +7 more
core   +1 more source

Disordered but rhythmic—the role of intrinsic protein disorder in eukaryotic circadian timing

open access: yesFEBS Letters, EarlyView.
Unstructured domains known as intrinsically disordered regions (IDRs) are present in nearly every part of the eukaryotic core circadian oscillator. IDRs enable many diverse inter‐ and intramolecular interactions that support clock function. IDR conformations are highly tunable by post‐translational modifications and environmental conditions, which ...
Emery T. Usher, Jacqueline F. Pelham
wiley   +1 more source

Strengthening Crypto-1 Cipher Against Algebraic Attacks

open access: yesJournal of ICT Research and Applications, 2015
In the last few years, several studies addressed the problem of data security in Mifare Classic. One of its weaknesses is the low random number quality. This causes SAT solver attacks to have lower complexity.
Farah Afianti, Ari M. Barmawi
doaj   +1 more source

Bit‐level evaluation of piccolo block cipher by satisfiability problem solver

open access: yesIET Information Security, 2023
In the field of symmetric key cryptography, the security against distinguishing attacks is one of the crucial security requirements. With advancements in computing capabilities and cryptanalysis techniques in recent years, more efficient methods have ...
Shion Utsumi   +2 more
doaj   +1 more source

SAT Attacks on ARX Ciphers with Automated Equations Generation [PDF]

open access: yesInfocommunications journal, 2019
We propose a novel and simple approach to algebraic attack on block ciphers with the SAT-solvers. As opposed to a standard approach, the equations for key expansion algorithms are not included in the formulas that are converted to satisfiability problem. The lack of equations leads to finding the solution much faster.
Andrzejczak, Michal, Dudzic, Wladyslaw
openaire   +2 more sources

A Satisfiability Modulo Theory Approach to Secure State Reconstruction in Differentially Flat Systems Under Sensor Attacks [PDF]

open access: yes, 2015
We address the problem of estimating the state of a differentially flat system from measurements that may be corrupted by an adversarial attack. In cyber-physical systems, malicious attacks can directly compromise the system's sensors or manipulate the ...
Bezzo, Nicola   +5 more
core   +1 more source

Home - About - Disclaimer - Privacy