Results 41 to 50 of about 400,990 (266)
SAT Attacks on ARX Ciphers with Automated Equations Generation [PDF]
We propose a novel and simple approach to algebraic attack on block ciphers with the SAT-solvers. As opposed to a standard approach, the equations for key expansion algorithms are not included in the formulas that are converted to satisfiability problem. The lack of equations leads to finding the solution much faster.
Andrzejczak, Michal, Dudzic, Wladyslaw
openaire +2 more sources
ABSTRACT Introduction Neuroblastoma (NB) with central nervous system (CNS) metastases is rare at diagnosis, but occurs more often during relapse/progression. Patients with CNS metastases face a dismal prognosis, with no standardized curative treatment available.
Vicente Santa‐Maria Lopez +13 more
wiley +1 more source
The chances of detecting a malicious reliability attack induced by an offshore foundry are grim. The hardware Trojans affecting a circuit’s reliability do not tend to alter the circuit layout. These Trojans often manifest as an increased delay in certain
Navya Mohan, J. P. Anita
doaj +1 more source
Discovering, quantifying, and displaying attacks
In the design of software and cyber-physical systems, security is often perceived as a qualitative need, but can only be attained quantitatively. Especially when distributed components are involved, it is hard to predict and confront all possible attacks.
Nielson, Flemming +2 more
core +1 more source
ABSTRACT Background B‐cell lymphoblastic lymphoma (B‐LBL) represents a rare variety of non‐Hodgkin lymphoma, with limited research on its biology, progression, and management. Methods A retrospective analysis was performed on the clinical characteristics of 256 patients aged ≤18 years who received treatment under the China Net Childhood Lymphoma (CNCL)‐
Zhijuan Liu +20 more
wiley +1 more source
Generating Cryptographic S-Boxes Using the Reinforcement Learning
Substitution boxes (S-boxes) are essential components of many cryptographic primitives. The Dijkstra algorithm, SAT solvers, and heuristic methods have been used to find bitsliced implementations of S-boxes.
Giyoon Kim +4 more
doaj +1 more source
Understanding Database Reconstruction Attacks on Public Data [PDF]
In 2020 the U.S. Census Bureau will conduct the Constitutionally mandated decennial Census of Population and Housing. Because a census involves collecting large amounts of private data under the promise of confidentiality, traditionally statistics are ...
Abowd, John M +2 more
core +1 more source
Disordered but rhythmic—the role of intrinsic protein disorder in eukaryotic circadian timing
Unstructured domains known as intrinsically disordered regions (IDRs) are present in nearly every part of the eukaryotic core circadian oscillator. IDRs enable many diverse inter‐ and intramolecular interactions that support clock function. IDR conformations are highly tunable by post‐translational modifications and environmental conditions, which ...
Emery T. Usher, Jacqueline F. Pelham
wiley +1 more source
Automated Search Oriented to Key Recovery on Ciphers with Linear Key Schedule
Automatic modelling to search distinguishers with high probability covering as many rounds as possible, such as MILP, SAT/SMT, CP models, has become a very popular cryptanalysis topic today.
Lingyue Qin +4 more
doaj +1 more source
A Multi-Observer Based Estimation Framework for Nonlinear Systems under Sensor Attacks
We address the problem of state estimation and attack isolation for general discrete-time nonlinear systems when sensors are corrupted by (potentially unbounded) attack signals.
Kuijper, Margreta +3 more
core +1 more source

