Results 31 to 40 of about 400,990 (266)
Advancing Hardware Security Using Polymorphic and Stochastic Spin-Hall Effect Devices
Protecting intellectual property (IP) in electronic circuits has become a serious challenge in recent years. Logic locking/encryption and layout camouflaging are two prominent techniques for IP protection.
amarù +6 more
core +1 more source
Complexity Analysis of the SAT Attack on Logic Locking
Due to the adoption of horizontal business models following the globalization of semiconductor manufacturing, the overproduction of integrated circuits (ICs) and the piracy of intellectual properties (IPs) can lead to significant damage to the integrity of the semiconductor supply chain. Logic locking emerges as a primary design-for-security measure to
Yadi Zhong, Ujjwal Guin
openaire +2 more sources
Using Linearizing Sets to Solve Multivariate Quadratic Equations in Algebraic Cryptanalysis
In this paper we describe a class of cryptographic guess-and-determine attacks which is based on the notion of a linearizing set. A linearizing set-based attack is applied to a system of Multivariate Quadratic equations (MQ) over $GF(2)$ field, which ...
Alexander Semenov +3 more
doaj +1 more source
Dynamic deployment of context-aware access control policies for constrained security devices [PDF]
Securing the access to a server, guaranteeing a certain level of protection over an encrypted communication channel, executing particular counter measures when attacks are detected are examples of security requirements.
Cuppens, Frederic +4 more
core +1 more source
Lifestyle Behaviors and Cardiotoxic Treatment Risks in Adult Childhood Cancer Survivors
ABSTRACT Background Higher doses of anthracyclines and heart‐relevant radiotherapy increase cardiovascular disease (CVD) risk. This study assessed CVD and CVD risk factors among adult childhood cancer survivors (CCSs) across cardiotoxic treatment risk groups and examined associations between lifestyle behaviors and treatment risks.
Ruijie Li +6 more
wiley +1 more source
Strengthening Crypto-1 Cipher Against Algebraic Attacks
In the last few years, several studies addressed the problem of data security in Mifare Classic. One of its weaknesses is the low random number quality. This causes SAT solver attacks to have lower complexity.
Farah Afianti, Ari M. Barmawi
doaj +1 more source
Bit‐level evaluation of piccolo block cipher by satisfiability problem solver
In the field of symmetric key cryptography, the security against distinguishing attacks is one of the crucial security requirements. With advancements in computing capabilities and cryptanalysis techniques in recent years, more efficient methods have ...
Shion Utsumi +2 more
doaj +1 more source
A Satisfiability Modulo Theory Approach to Secure State Reconstruction in Differentially Flat Systems Under Sensor Attacks [PDF]
We address the problem of estimating the state of a differentially flat system from measurements that may be corrupted by an adversarial attack. In cyber-physical systems, malicious attacks can directly compromise the system's sensors or manipulate the ...
Bezzo, Nicola +5 more
core +1 more source
This paper presents a detection algorithm for sensor attacks and a resilient state estimation scheme for a class of uniformly observable nonlinear systems. An adversary is supposed to corrupt a subset of sensors with the possibly unbounded signals, while
Eun, Yongsoon +4 more
core +1 more source
. Sprout is a lightweight stream cipher proposed by Armknecht and Mikhalev at FSE 2015. It has a Grain-like structure with two State Registers of size 40 bits each, which is exactly half the state size of Grain v1.
A Biryukov +4 more
core +2 more sources

