Results 31 to 40 of about 400,990 (266)

Advancing Hardware Security Using Polymorphic and Stochastic Spin-Hall Effect Devices

open access: yes, 2018
Protecting intellectual property (IP) in electronic circuits has become a serious challenge in recent years. Logic locking/encryption and layout camouflaging are two prominent techniques for IP protection.
amarù   +6 more
core   +1 more source

Complexity Analysis of the SAT Attack on Logic Locking

open access: yesIEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 2023
Due to the adoption of horizontal business models following the globalization of semiconductor manufacturing, the overproduction of integrated circuits (ICs) and the piracy of intellectual properties (IPs) can lead to significant damage to the integrity of the semiconductor supply chain. Logic locking emerges as a primary design-for-security measure to
Yadi Zhong, Ujjwal Guin
openaire   +2 more sources

Using Linearizing Sets to Solve Multivariate Quadratic Equations in Algebraic Cryptanalysis

open access: yesIEEE Access, 2023
In this paper we describe a class of cryptographic guess-and-determine attacks which is based on the notion of a linearizing set. A linearizing set-based attack is applied to a system of Multivariate Quadratic equations (MQ) over $GF(2)$ field, which ...
Alexander Semenov   +3 more
doaj   +1 more source

Dynamic deployment of context-aware access control policies for constrained security devices [PDF]

open access: yes, 2009
Securing the access to a server, guaranteeing a certain level of protection over an encrypted communication channel, executing particular counter measures when attacks are detected are examples of security requirements.
Cuppens, Frederic   +4 more
core   +1 more source

Lifestyle Behaviors and Cardiotoxic Treatment Risks in Adult Childhood Cancer Survivors

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Background Higher doses of anthracyclines and heart‐relevant radiotherapy increase cardiovascular disease (CVD) risk. This study assessed CVD and CVD risk factors among adult childhood cancer survivors (CCSs) across cardiotoxic treatment risk groups and examined associations between lifestyle behaviors and treatment risks.
Ruijie Li   +6 more
wiley   +1 more source

Strengthening Crypto-1 Cipher Against Algebraic Attacks

open access: yesJournal of ICT Research and Applications, 2015
In the last few years, several studies addressed the problem of data security in Mifare Classic. One of its weaknesses is the low random number quality. This causes SAT solver attacks to have lower complexity.
Farah Afianti, Ari M. Barmawi
doaj   +1 more source

Bit‐level evaluation of piccolo block cipher by satisfiability problem solver

open access: yesIET Information Security, 2023
In the field of symmetric key cryptography, the security against distinguishing attacks is one of the crucial security requirements. With advancements in computing capabilities and cryptanalysis techniques in recent years, more efficient methods have ...
Shion Utsumi   +2 more
doaj   +1 more source

A Satisfiability Modulo Theory Approach to Secure State Reconstruction in Differentially Flat Systems Under Sensor Attacks [PDF]

open access: yes, 2015
We address the problem of estimating the state of a differentially flat system from measurements that may be corrupted by an adversarial attack. In cyber-physical systems, malicious attacks can directly compromise the system's sensors or manipulate the ...
Bezzo, Nicola   +5 more
core   +1 more source

Detection of Sensor Attack and Resilient State Estimation for Uniformly Observable Nonlinear Systems having Redundant Sensors

open access: yes, 2018
This paper presents a detection algorithm for sensor attacks and a resilient state estimation scheme for a class of uniformly observable nonlinear systems. An adversary is supposed to corrupt a subset of sensors with the possibly unbounded signals, while
Eun, Yongsoon   +4 more
core   +1 more source

Some Results on Sprout [PDF]

open access: yes, 2015
. Sprout is a lightweight stream cipher proposed by Armknecht and Mikhalev at FSE 2015. It has a Grain-like structure with two State Registers of size 40 bits each, which is exactly half the state size of Grain v1.
A Biryukov   +4 more
core   +2 more sources

Home - About - Disclaimer - Privacy