Learn More
We discuss numerical modeling attacks on several proposed strong physical unclonable functions (PUFs). Given a set of challenge-response pairs (CRPs) of a Strong PUF, the goal of our attacks is to construct a computer algorithm which behaves indistinguishably from the original PUF on almost all CRPs. If successful, this algorithm can subsequently(More)
One part of the original PUF promise was their improved resilience against physical attack methods, such as cloning, invasive techniques, and arguably also side channels. In recent years, however, a number of effective physical attacks on PUFs have been developed [17,18,20,8,2]. This paper continues this line of research, and introduces the first power and(More)
We discuss the question of how physical statements can be proven over digital communication channels between two parties (a "prover" and a "verifier") residing in two separate local systems. Examples include: (i) "a certain object in the prover's system has temperature X°C", (ii) "two certain objects in the prover's system are positioned at distance(More)
PURPOSE To measure laminar and peripapillary scleral architecture in normal and glaucomatous Chinese eyes with normal and those with elongated axial length. METHODS The histomorphometric investigation included a normal group (nonaxially elongated eyes) of 40 human globes (40 patients; mean age, 41.3 +/- 13.4 years; range,15-68) enucleated because of(More)
BACKGROUND Administration of convalescent plasma, serum, or hyperimmune immunoglobulin may be of clinical benefit for treatment of severe acute respiratory infections (SARIs) of viral etiology. We conducted a systematic review and exploratory meta-analysis to assess the overall evidence. METHODS Healthcare databases and sources of grey literature were(More)
—We discuss the first power and timing side channels on Strong Physical Unclonable Functions (Strong PUFs) in the literature, and describe their efficient exploitation via adapted machine learning (ML) techniques. Our method is illustrated by the example of the two currently most secure (CCS 2010, IEEE T-IFS 2013) electrical Strong PUFs, so-called XOR(More)
Machine Learning (ML) is a well-studied strategy in modeling Physical Unclonable Functions (PUFs) but reaches its limits while applied on instances of high complexity. To address this issue, side-channel attacks have recently been combined with modeling techniques to make attacks more efficient [25][26]. In this work, we present an overview and survey of(More)
RAV12 is a chimeric antibody that recognizes an N-linked carbohydrate antigen (RAAG12) strongly expressed on multiple solid organ cancers. More than 90% of tumors of colorectal, gastric, and pancreatic origin express RAAG12, and a majority of these tumors exhibit uniform RAAG12 expression. RAV12 exhibits potent cytotoxic activity in vitro against COLO 205(More)
Zigzag transformation is a kind of scrambling algorithm with low time complexity and good scrambling effect. And inner product polarization vector algorithm is a new encryption algorithm deduced from Attribute Theory. Here both above are combined by first making use of improved Zigzag transformation to have the image scrambled, next encrypting the(More)