搜索结果: 1-15 共查到“军事学 SAT”相关记录21条 . 查询时间(0.046 秒)
Ci-Lock: Cipher Induced Logic Locking Resistant Against SAT Attacks
Logic locking Block cipher Hardware obfuscation
2019/8/30
Protection of intellectual property (IP) cores is one of the most practical security concern for modern integrated circuit (IC) industry. Albeit being well-studied from a practical perspective, the pr...
SAT-attack is known to successfully decrypt a functionally correct key of a locked combinational circuit. It is possible to extend the SAT-attack to sequential circuits through the scan-chain by selec...
A SAT-based approach for index calculus on binary elliptic curves
discrete logarithm index calculus elliptic curves
2019/3/22
Logical cryptanalysis, first introduced by Massacci in 2000, is a viable alternative to common algebraic cryptanalysis techniques over boolean fields. With XOR operations being at the core of many cry...
BeSAT: Behavioral SAT-based Attack on Cyclic Logic Encryption
logic encryption SAT-based attack cyclic circuit
2019/1/26
Cyclic logic encryption is newly proposed in the area of hardware security. It introduces feedback cycles into the circuit to defeat existing logic decryption techniques. To ensure that the circuit is...
SigAttack: New High-level SAT-based Attack on Logic Encryptions
logic encryption attack SAT
2019/1/26
Logic encryption is a powerful hardware protection technique that uses extra key inputs to lock a circuit from piracy or unauthorized use. The recent discovery of the SAT-based attack with Distinguish...
SAT-based Bit-flipping Attack on Logic Encryptions
logic encryption SAT-based attack security analysis
2017/12/6
Logic encryption is a hardware security technique that uses extra key inputs to prevent unauthorized use of a circuit. With the discovery of the SAT-based attack, new encryption techniques such as SAR...
Logic locking is a technique that's proposed to protect outsourced IC designs from piracy and counterfeiting by untrusted foundries. A locked IC preserves the correct functionality only when a correct...
CycSAT: SAT-Based Attack on Cyclic Logic Encryptions
hardware security logic encryption SAT
2017/6/28
Cyclic logic encryption is a newly proposed circuit obfuscation technique in hardware security. It was claimed to be SAT-unresolvable because feedback cycles were intentionally inserted under keys int...
SAT-based Cryptanalysis of Authenticated Ciphers from the CAESAR Competition
SAT solvers SAT-based cryptanalysis logic cryptanalysis
2016/12/7
We investigate six authenticated encryption schemes (ACORN, ASCON-128a, Ketje
Jr, ICEPOLE-128a, MORUS, and NORX-32) from the CAESAR competition. We
aim at state recovery attacks using a SAT solver a...
A SAT-Based Algorithm for Finding Short Cycles in Shift Register Based Stream Ciphers
stream cipher Trivium Grain
2016/12/7
This paper addresses the problem of finding short cycles in the internal state space of shift register based stream ciphers. The absence of short cycles is a desirable property for stream ciphers beca...
Logic locking is a technique that has been proposed to protect
outsourced IC designs from piracy and counterfeiting by untrusted
foundries. A locked IC preserves the correct functionality only when ...
SAT-based cryptanalysis of ACORN
SAT-based cryptanalysis CAESAR competition Authenticated encryption
2016/5/30
The CAESAR competition aims to provide a portfolio of authenticated encryption algorithms.
SAT solvers represent powerful tools to verify automatically and efficiently (among others) the
confidentia...
Optimizing S-box Implementations for Several Criteria using SAT Solvers
S-box SAT solvers implementation optimization
2016/2/25
We explore the feasibility of applying SAT solvers to optimizing
implementations of small functions such as S-boxes for multiple
optimization criteria, e.g., the number of nonlinear gates and the nu...
Analysis of Boomerang Differential Trails via a SAT-Based Constraint Solver URSA
Boomerang Differential Trails SAT-Based Constraint Solver URSA
2016/1/8
In order to obtain differential patterns over many rounds of a cryptographic primitive,
the cryptanalyst often needs to work on local differential trail analysis. Examples include
merging two differ...
Time-release Protocol from Bitcoin and Witness Encryption for SAT
time-release crypto bitcoin mining proof-of-work
2015/12/30
We propose a new time-release protocol based on the bitcoin protocol and witness encryption. We derive a ``public key'' from the bitcoin block chain for encryption. The decryption key are the unpredic...