Results 41 to 50 of about 400,990 (266)

SAT Attacks on ARX Ciphers with Automated Equations Generation [PDF]

open access: yesInfocommunications journal, 2019
We propose a novel and simple approach to algebraic attack on block ciphers with the SAT-solvers. As opposed to a standard approach, the equations for key expansion algorithms are not included in the formulas that are converted to satisfiability problem. The lack of equations leads to finding the solution much faster.
Andrzejczak, Michal, Dudzic, Wladyslaw
openaire   +2 more sources

Prognostic Impact of Treatment Modalities, Including Targeted Compartmental Radio‐Immunotherapy, in a Cohort of Neuroblastoma Patients With CNS Metastases at Relapse

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Introduction Neuroblastoma (NB) with central nervous system (CNS) metastases is rare at diagnosis, but occurs more often during relapse/progression. Patients with CNS metastases face a dismal prognosis, with no standardized curative treatment available.
Vicente Santa‐Maria Lopez   +13 more
wiley   +1 more source

Early Detection of Clustered Trojan Attacks on Integrated Circuits Using Transition Delay Fault Model

open access: yesCryptography, 2023
The chances of detecting a malicious reliability attack induced by an offshore foundry are grim. The hardware Trojans affecting a circuit’s reliability do not tend to alter the circuit layout. These Trojans often manifest as an increased delay in certain
Navya Mohan, J. P. Anita
doaj   +1 more source

Discovering, quantifying, and displaying attacks

open access: yes, 2016
In the design of software and cyber-physical systems, security is often perceived as a qualitative need, but can only be attained quantitatively. Especially when distributed components are involved, it is hard to predict and confront all possible attacks.
Nielson, Flemming   +2 more
core   +1 more source

Clinical Characteristics and Prognostic Risk Factors for Pediatric B‐Cell Lymphoblastic Lymphoma: A Multicenter Retrospective Cohort Study for China Net Childhood Lymphoma

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Background B‐cell lymphoblastic lymphoma (B‐LBL) represents a rare variety of non‐Hodgkin lymphoma, with limited research on its biology, progression, and management. Methods A retrospective analysis was performed on the clinical characteristics of 256 patients aged ≤18 years who received treatment under the China Net Childhood Lymphoma (CNCL)‐
Zhijuan Liu   +20 more
wiley   +1 more source

Generating Cryptographic S-Boxes Using the Reinforcement Learning

open access: yesIEEE Access, 2021
Substitution boxes (S-boxes) are essential components of many cryptographic primitives. The Dijkstra algorithm, SAT solvers, and heuristic methods have been used to find bitsliced implementations of S-boxes.
Giyoon Kim   +4 more
doaj   +1 more source

Understanding Database Reconstruction Attacks on Public Data [PDF]

open access: yes, 2018
In 2020 the U.S. Census Bureau will conduct the Constitutionally mandated decennial Census of Population and Housing. Because a census involves collecting large amounts of private data under the promise of confidentiality, traditionally statistics are ...
Abowd, John M   +2 more
core   +1 more source

Disordered but rhythmic—the role of intrinsic protein disorder in eukaryotic circadian timing

open access: yesFEBS Letters, EarlyView.
Unstructured domains known as intrinsically disordered regions (IDRs) are present in nearly every part of the eukaryotic core circadian oscillator. IDRs enable many diverse inter‐ and intramolecular interactions that support clock function. IDR conformations are highly tunable by post‐translational modifications and environmental conditions, which ...
Emery T. Usher, Jacqueline F. Pelham
wiley   +1 more source

Automated Search Oriented to Key Recovery on Ciphers with Linear Key Schedule

open access: yesIACR Transactions on Symmetric Cryptology, 2021
Automatic modelling to search distinguishers with high probability covering as many rounds as possible, such as MILP, SAT/SMT, CP models, has become a very popular cryptanalysis topic today.
Lingyue Qin   +4 more
doaj   +1 more source

A Multi-Observer Based Estimation Framework for Nonlinear Systems under Sensor Attacks

open access: yes, 2019
We address the problem of state estimation and attack isolation for general discrete-time nonlinear systems when sensors are corrupted by (potentially unbounded) attack signals.
Kuijper, Margreta   +3 more
core   +1 more source

Home - About - Disclaimer - Privacy