Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Does logic locking work with {EDA} tools?
Logic locking is a promising solution against emerging hardware security threats, which
entails protecting a Boolean circuit using a “keying” mechanism. The latest and hitherto …
entails protecting a Boolean circuit using a “keying” mechanism. The latest and hitherto …
A touch of evil: High-assurance cryptographic hardware from untrusted components
The semiconductor industry is fully globalized and integrated circuits (ICs) are commonly
defined, designed and fabricated in different premises across the world. This reduces …
defined, designed and fabricated in different premises across the world. This reduces …
Security implications of intentional capacitive crosstalk
C Kison, OM Awad, M Fyrbiak… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
With advances in shrinking process technology sizes, the parasitic effects of closely routed
adjacent wires, crosstalk, still present problems in practice since they directly influence …
adjacent wires, crosstalk, still present problems in practice since they directly influence …
Private circuits III: hardware trojan-resilience via testing amplification
Security against hardware trojans is currently becoming an essential ingredient to ensure
trust in information systems. A variety of solutions have been introduced to reach this goal …
trust in information systems. A variety of solutions have been introduced to reach this goal …
Steel: composable hardware-based stateful and randomised functional encryption
Trusted execution environments (TEEs) enable secure execution of programs on untrusted
hosts and cryptographically attest the correctness of outputs. As these are complex systems …
hosts and cryptographically attest the correctness of outputs. As these are complex systems …
SoK: A stratified approach to blockchain decentralization
Decentralization has been touted as the principal security advantage which propelled
blockchain systems at the forefront of developments in the financial technology space. Its …
blockchain systems at the forefront of developments in the financial technology space. Its …
Efficiently testable circuits without conductivity
The notion of “efficiently testable circuits”(ETC) was recently put forward by Baig et
al.(ITCS'23). Informally, an ETC compiler takes as input any Boolean circuit C and outputs a …
al.(ITCS'23). Informally, an ETC compiler takes as input any Boolean circuit C and outputs a …
Secure outsourcing of cryptographic circuits manufacturing
The fabrication process of integrated circuits (ICs) is complex and requires the use of off-
shore foundries to lower the costs and to have access to leading-edge manufacturing …
shore foundries to lower the costs and to have access to leading-edge manufacturing …
Leakage resilient l-more extractable hash and applications to non-malleable cryptography
Abstract $\ell $-more extractable hash functions were introduced by Kiayias et al.(CCS'16)
as a strengthening of extractable hash functions by Goldwasser et al.(Eprint'11) and …
as a strengthening of extractable hash functions by Goldwasser et al.(Eprint'11) and …
(Continuous) Non-malleable Codes for Partial Functions with Manipulation Detection and Light Updates
Non-malleable codes were introduced by Dziembowski et al.(in: Yao (ed) ICS2010,
Tsinghua University Press, 2010), and its main application is the protection of cryptographic …
Tsinghua University Press, 2010), and its main application is the protection of cryptographic …