Advancing Hardware Security Using Polymorphic and Stochastic Spin-Hall Effect Devices
Protecting intellectual property (IP) in electronic circuits has become a serious challenge in recent years. Logic locking/encryption and layout camouflaging are two prominent techniques for IP protection.
amarù +6 more
core +1 more source
Dynamic deployment of context-aware access control policies for constrained security devices [PDF]
Securing the access to a server, guaranteeing a certain level of protection over an encrypted communication channel, executing particular counter measures when attacks are detected are examples of security requirements.
Cuppens, Frederic +4 more
core +1 more source
Using Linearizing Sets to Solve Multivariate Quadratic Equations in Algebraic Cryptanalysis
In this paper we describe a class of cryptographic guess-and-determine attacks which is based on the notion of a linearizing set. A linearizing set-based attack is applied to a system of Multivariate Quadratic equations (MQ) over $GF(2)$ field, which ...
Alexander Semenov +3 more
doaj +1 more source
This paper presents a detection algorithm for sensor attacks and a resilient state estimation scheme for a class of uniformly observable nonlinear systems. An adversary is supposed to corrupt a subset of sensors with the possibly unbounded signals, while
Eun, Yongsoon +4 more
core +1 more source
Integrated cost-benefit analysis of tsetse control and herd productivity to inform control programs for animal African trypanosomiasis [PDF]
Animal African trypanosomiasis (AAT) and its tsetse vector are responsible for annual losses estimated in billions of US dollars ($). Recent years have seen the implementation of a series of multinational interventions.
Chilongo, K +7 more
core +1 more source
Disordered but rhythmic—the role of intrinsic protein disorder in eukaryotic circadian timing
Unstructured domains known as intrinsically disordered regions (IDRs) are present in nearly every part of the eukaryotic core circadian oscillator. IDRs enable many diverse inter‐ and intramolecular interactions that support clock function. IDR conformations are highly tunable by post‐translational modifications and environmental conditions, which ...
Emery T. Usher, Jacqueline F. Pelham
wiley +1 more source
Strengthening Crypto-1 Cipher Against Algebraic Attacks
In the last few years, several studies addressed the problem of data security in Mifare Classic. One of its weaknesses is the low random number quality. This causes SAT solver attacks to have lower complexity.
Farah Afianti, Ari M. Barmawi
doaj +1 more source
Bit‐level evaluation of piccolo block cipher by satisfiability problem solver
In the field of symmetric key cryptography, the security against distinguishing attacks is one of the crucial security requirements. With advancements in computing capabilities and cryptanalysis techniques in recent years, more efficient methods have ...
Shion Utsumi +2 more
doaj +1 more source
SAT Attacks on ARX Ciphers with Automated Equations Generation [PDF]
We propose a novel and simple approach to algebraic attack on block ciphers with the SAT-solvers. As opposed to a standard approach, the equations for key expansion algorithms are not included in the formulas that are converted to satisfiability problem. The lack of equations leads to finding the solution much faster.
Andrzejczak, Michal, Dudzic, Wladyslaw
openaire +2 more sources
A Satisfiability Modulo Theory Approach to Secure State Reconstruction in Differentially Flat Systems Under Sensor Attacks [PDF]
We address the problem of estimating the state of a differentially flat system from measurements that may be corrupted by an adversarial attack. In cyber-physical systems, malicious attacks can directly compromise the system's sensors or manipulate the ...
Bezzo, Nicola +5 more
core +1 more source

