Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

Article Types

Countries / Regions

Search Results (12)

Search Parameters:
Keywords = Trivium

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
23 pages, 21467 KB  
Article
Protecting Dynamically Obfuscated Scan Chain Architecture from DOSCrack with Trivium Pseudo-Random Number Generation
by Jiaming Wu, Olivia Dizon-Paradis, Sazadur Rahman, Damon L. Woodard and Domenic Forte
Cryptography 2025, 9(1), 6; https://doi.org/10.3390/cryptography9010006 - 14 Jan 2025
Cited by 2 | Viewed by 2292
Abstract
Design-for-test/debug (DfT/D) introduces scan chain testing to increase testability and fault coverage by inserting scan flip-flops. However, these scan chains are also known to be a liability for security primitives. In previous research, the dynamically obfuscated scan chain (DOSC) was introduced to protect [...] Read more.
Design-for-test/debug (DfT/D) introduces scan chain testing to increase testability and fault coverage by inserting scan flip-flops. However, these scan chains are also known to be a liability for security primitives. In previous research, the dynamically obfuscated scan chain (DOSC) was introduced to protect logic-locking keys from scan-based attacks by obscuring test patterns and responses. In this paper, we present DOSCrack, an oracle-guided attack to de-obfuscate DOSC using symbolic execution and binary clustering, which significantly reduces the candidate seed space to a manageable quantity. Our symbolic execution engine employs scan mode simulation and satisfiability modulo theories (SMT) solvers to reduce the possible seed space, while obfuscation key clustering allows us to effectively rule out a group of seeds that share similarities. An integral component of our approach is the use of sequential equivalence checking (SEC), which aids in identifying distinct simulation patterns to differentiate between potential obfuscation keys. We experimentally applied our DOSCrack framework on four different sizes of DOSC benchmarks and compared their runtime and complexity. Finally, we propose a low-cost countermeasure to DOSCrack which incorporates a nonlinear feedback shift register (NLFSR) to increase the effort of symbolic execution modeling and serves as an effective defense against our DOSCrack framework. Our research effectively addresses a critical vulnerability in scan-chain obfuscation methodologies, offering insights into DfT/D and logic locking for both academic research and industrial applications. Our framework highlights the need to craft robust and adaptable defense mechanisms to counter evolving scan-based attacks. Full article
(This article belongs to the Special Issue Emerging Topics in Hardware Security)
Show Figures

Figure 1

11 pages, 240 KB  
Article
From Rational Inquiry to Sacred Insight: The Role of Religion in Augustine’s Views on Liberal Education
by Jeong-In Lee and Jangwan Ko
Religions 2024, 15(1), 122; https://doi.org/10.3390/rel15010122 - 17 Jan 2024
Cited by 1 | Viewed by 4372
Abstract
This paper examines the role of religion in liberal education based on the Christian thinker St. Augustine. In his early work, On Order, Augustine posited that through rational inquiry, as epitomized by rational knowledge learned by the trivium and the quadrivium, [...] Read more.
This paper examines the role of religion in liberal education based on the Christian thinker St. Augustine. In his early work, On Order, Augustine posited that through rational inquiry, as epitomized by rational knowledge learned by the trivium and the quadrivium, one can understand the order of the world and eventually obtain divine truth. However, in On True Religion, he withdraws from this position and instead emphasizes that rational knowledge has three limitations: First, regarding the foundation of knowledge, rational knowledge can inform about what things are, but it fails to explain why things exist in the manner they do. Second, concerning the purpose of knowledge, rational knowledge can elucidate the attributes of things, but it falls short in providing the ultimate goals to which these things aspire. Third, concerning the acquisition of knowledge, rational knowledge seeks extroverted knowledge, i.e., knowledge that is oriented toward external objects without introspecting on the inner self. In light of Augustine’s emphasis on the limitations of rational knowledge, the current study provides two possible interpretations of the relationship between liberal education and religion. One is an active interpretation which posits that, by resolving its limitations, religion can fully replace liberal education. The other is a passive interpretation, which suggests that religion can illuminate the boundaries of liberal education and refresh them, thereby enabling the learner to deeply reflect on knowledge and connect it with their inner self. Full article
32 pages, 18300 KB  
Article
New Insights into the Medieval Hispano-Muslim Panel Painting: The Alfarje Found in a Balearic Casal (Spain)
by Carla Álvarez-Romero, Ana García-Bueno, Teresa López-Martínez, Rafael Turatti-Guerrero, Noemí Montoya and María Teresa Doménech-Carbó
Molecules 2023, 28(3), 1235; https://doi.org/10.3390/molecules28031235 - 27 Jan 2023
Cited by 2 | Viewed by 3690
Abstract
Hispano-Muslim culture flourished during the Middle Ages in the Iberian Peninsula and Balearic Islands. During the restoration of a Balearic nobiliary building (casal), several panels with polychrome decoration on the back side were found. They were part of an old Muslim [...] Read more.
Hispano-Muslim culture flourished during the Middle Ages in the Iberian Peninsula and Balearic Islands. During the restoration of a Balearic nobiliary building (casal), several panels with polychrome decoration on the back side were found. They were part of an old Muslim wooden ceiling (alfarje). A multi-technique strategy including optical microscopy, infrared and μRaman spectroscopies, field emission scanning electron microscopy-X-ray microanalysis (FESEM-EDX), focused ion beam (FIB-FESEM-EDX), atomic force microscopy nanoindentation (AFM-NI), and gas chromatography-mass spectrometry (GC-MS) has been applied in the analysis of these panel paintings and has provided morphological and compositional data that have led to the identification of the materials and artistic technique as well as the alteration mechanisms due to the natural aging and the adverse conditions of conservation. As a novelty, this study has confirmed the use of indigo as a blue pigment, an unusual material in Hispano-Muslim panel painting. Apart from the notable change in the visual appearance observed in the paintings, the study has also confirmed a change in the mechanical resistance in the paint layers. These changes have been induced by the combination of the chemical and microbiological alteration mechanisms identified. Full article
Show Figures

Figure 1

13 pages, 432 KB  
Article
Encryption AXI Transaction Core for Enhanced FPGA Security
by Jesús Lázaro, Armando Astarloa, Leire Muguira, Unai Bidarte and Jaime Jiménez
Electronics 2022, 11(20), 3361; https://doi.org/10.3390/electronics11203361 - 18 Oct 2022
Cited by 3 | Viewed by 3284
Abstract
The current hot topic in cyber-security is not constrained to software layers. As attacks on electronic circuits have become more usual and dangerous, hardening digital System-on-Chips has become crucial. This article presents a novel electronic core to encrypt and decrypt data between two [...] Read more.
The current hot topic in cyber-security is not constrained to software layers. As attacks on electronic circuits have become more usual and dangerous, hardening digital System-on-Chips has become crucial. This article presents a novel electronic core to encrypt and decrypt data between two digital modules through an Advanced eXtensible Interface (AXI) connection. The core is compatible with AXI and is based on a Trivium stream cipher. Its implementation has been tested on a Zynq platform. The core prevents unauthorized data extraction by encrypting data on the fly. In addition, it takes up a small area—242 LUTs—and, as the core’s AXI to AXI path is fully combinational, it does not interfere with the system’s overall performance, with a maximum AXI clock frequency of 175 MHz. Full article
(This article belongs to the Section Electronic Materials, Devices and Applications)
Show Figures

Figure 1

19 pages, 1468 KB  
Article
Music as a Liberal Art: The Poetry of the Universe
by Dominic A. Aquila
Religions 2022, 13(9), 792; https://doi.org/10.3390/rel13090792 - 29 Aug 2022
Cited by 3 | Viewed by 4278
Abstract
This article explores the place of music in the classical liberal arts curriculum, which consists of the trivium (the arts of language) and the quadrivium (the arts of number). Music is part of the quadrivial disciplines and studied as applied arithmetic. However, as [...] Read more.
This article explores the place of music in the classical liberal arts curriculum, which consists of the trivium (the arts of language) and the quadrivium (the arts of number). Music is part of the quadrivial disciplines and studied as applied arithmetic. However, as argued in this article, it is also a bridge to the discipline of rhetoric, which is part of the trivium. The article begins with a brief review of St. Augustine’s De Musica, the first in a planned (but unrealized) series of dialogs on the value of the classical liberal arts to the emerging Christian culture of Antiquity. It proceeds to a discussion of music and its relation to the contemporary American liberal arts curriculum. Two case studies follow that address the ontological reality of music as a time-bound medium, and attempts to mute this reality in the service of creating a sense of timelessness. Thus subsuming the temporal into the Divine–what Augustine called “a poem of the universe”. The first case study is Dante Alighieri’s Paradiso, which is a journey through the heavens with each planet representing one of the seven liberal arts as preparatory to the Beatific Vision. The second case study focuses on J.S. Bach’s attempts to create a sense of timelessness in the St. Matthew Passion by the use of musical forms and musical rhetorical devices that tend to abolish time. The article concludes with suggestions on how teachers can use 20th and 21st-century movements in Western art music as pathways to appreciate music’s pivotal role in the Catholic liberal arts tradition. Full article
(This article belongs to the Special Issue Catholic Education and the Liberal Arts)
Show Figures

Figure 1

19 pages, 32838 KB  
Article
Experimental FIA Methodology Using Clock and Control Signal Modifications under Power Supply and Temperature Variations
by Francisco Eugenio Potestad-Ordóñez, Erica Tena-Sánchez, José Miguel Mora-Gutiérrez, Manuel Valencia-Barrero and Carlos Jesús Jiménez-Fernández
Sensors 2021, 21(22), 7596; https://doi.org/10.3390/s21227596 - 16 Nov 2021
Viewed by 2746
Abstract
The security of cryptocircuits is determined not only for their mathematical formulation, but for their physical implementation. The so-called fault injection attacks, where an attacker inserts faults during the operation of the cipher to obtain a malfunction to reveal secret information, pose a [...] Read more.
The security of cryptocircuits is determined not only for their mathematical formulation, but for their physical implementation. The so-called fault injection attacks, where an attacker inserts faults during the operation of the cipher to obtain a malfunction to reveal secret information, pose a serious threat for security. These attacks are also used by designers as a vehicle to detect security flaws and then protect the circuits against these kinds of attacks. In this paper, two different attack methodologies are presented based on inserting faults through the clock signal or the control signal. The optimization of the attacks is evaluated under supply voltage and temperature variation, experimentally determining the feasibility through the evaluation of different Trivium versions in 90 nm ASIC technology implementations, also considering different routing alternatives. The results show that it is possible to inject effective faults with both methodologies, improving fault efficiency if the power supply voltage decreases, which requires only half the frequency of the short pulse inserted into the clock signal to obtain a fault. The clock signal modification methodology can be extended to other NLFSR-based cryptocircuits and the control signal-based methodology can be applied to both block and stream ciphers. Full article
(This article belongs to the Topic Internet of Things: Latest Advances)
Show Figures

Figure 1

18 pages, 5919 KB  
Article
Pushing the Boundaries: Forensic DNA Phenotyping Challenged by Single-Cell Sequencing
by Marta Diepenbroek, Birgit Bayer and Katja Anslinger
Genes 2021, 12(9), 1362; https://doi.org/10.3390/genes12091362 - 30 Aug 2021
Cited by 18 | Viewed by 6644
Abstract
Single-cell sequencing is a fast developing and very promising field; however, it is not commonly used in forensics. The main motivation behind introducing this technology into forensics is to improve mixture deconvolution, especially when a trace consists of the same cell type. Successful [...] Read more.
Single-cell sequencing is a fast developing and very promising field; however, it is not commonly used in forensics. The main motivation behind introducing this technology into forensics is to improve mixture deconvolution, especially when a trace consists of the same cell type. Successful studies demonstrate the ability to analyze a mixture by separating single cells and obtaining CE-based STR profiles. This indicates a potential use of the method in other forensic investigations, like forensic DNA phenotyping, in which using mixed traces is not fully recommended. For this study, we collected single-source autopsy blood from which the white cells were first stained and later separated with the DEPArray™ N×T System. Groups of 20, 10, and 5 cells, as well as 20 single cells, were collected and submitted for DNA extraction. Libraries were prepared using the Ion AmpliSeq™ PhenoTrivium Panel, which includes both phenotype (HIrisPlex-S: eye, hair, and skin color) and ancestry-associated SNP-markers. Prior to sequencing, half of the single-cell-based libraries were additionally amplified and purified in order to improve the library concentrations. Ancestry and phenotype analysis resulted in nearly full consensus profiles resulting in correct predictions not only for the cells groups but also for the ten re-amplified single-cell libraries. Our results suggest that sequencing of single cells can be a promising tool used to deconvolute mixed traces submitted for forensic DNA phenotyping. Full article
(This article belongs to the Special Issue Advances in Forensic Genetics)
Show Figures

Figure 1

19 pages, 1315 KB  
Article
Breaking Trivium Stream Cipher Implemented in ASIC Using Experimental Attacks and DFA
by Francisco Eugenio Potestad-Ordóñez, Manuel Valencia-Barrero, Carmen Baena-Oliva, Pilar Parra-Fernández and Carlos Jesús Jiménez-Fernández
Sensors 2020, 20(23), 6909; https://doi.org/10.3390/s20236909 - 3 Dec 2020
Cited by 14 | Viewed by 3755
Abstract
One of the best methods to improve the security of cryptographic systems used to exchange sensitive information is to attack them to find their vulnerabilities and to strengthen them in subsequent designs. Trivium stream cipher is one of the lightweight ciphers designed for [...] Read more.
One of the best methods to improve the security of cryptographic systems used to exchange sensitive information is to attack them to find their vulnerabilities and to strengthen them in subsequent designs. Trivium stream cipher is one of the lightweight ciphers designed for security applications in the Internet of things (IoT). In this paper, we present a complete setup to attack ASIC implementations of Trivium which allows recovering the secret keys using the active non-invasive technique attack of clock manipulation, combined with Differential Fault Analysis (DFA) cryptanalysis. The attack system is able to inject effective transient faults into the Trivium in a clock cycle and sample the faulty output. Then, the internal state of the Trivium is recovered using the DFA cryptanalysis through the comparison between the correct and the faulty outputs. Finally, a backward version of Trivium was also designed to go back and get the secret keys from the initial internal states. The key recovery has been verified with numerous simulations data attacks and used with the experimental data obtained from the Application Specific Integrated Circuit (ASIC) Trivium. The secret key of the Trivium were recovered experimentally in 100% of the attempts, considering a real scenario and minimum assumptions. Full article
(This article belongs to the Section Internet of Things)
Show Figures

Figure 1

24 pages, 7489 KB  
Article
Evaluation of the Ion AmpliSeq™ PhenoTrivium Panel: MPS-Based Assay for Ancestry and Phenotype Predictions Challenged by Casework Samples
by Marta Diepenbroek, Birgit Bayer, Kristina Schwender, Roberta Schiller, Jessica Lim, Robert Lagacé and Katja Anslinger
Genes 2020, 11(12), 1398; https://doi.org/10.3390/genes11121398 - 25 Nov 2020
Cited by 34 | Viewed by 7750
Abstract
As the field of forensic DNA analysis has started to transition from genetics to genomics, new methods to aid in crime scene investigations have arisen. The development of informative single nucleotide polymorphism (SNP) markers has led the forensic community to question if DNA [...] Read more.
As the field of forensic DNA analysis has started to transition from genetics to genomics, new methods to aid in crime scene investigations have arisen. The development of informative single nucleotide polymorphism (SNP) markers has led the forensic community to question if DNA can be a reliable “eye-witness” and whether the data it provides can shed light on unknown perpetrators. We have developed an assay called the Ion AmpliSeq™ PhenoTrivium Panel, which combines three groups of markers: 41 phenotype- and 163 ancestry-informative autosomal SNPs together with 120 lineage-specific Y-SNPs. Here, we report the results of testing the assay’s sensitivity and the predictions obtained for known reference samples. Moreover, we present the outcome of a blind study performed on real casework samples in order to understand the value and reliability of the information that would be provided to police investigators. Furthermore, we evaluated the accuracy of admixture prediction in Converge™ Software. The results show the panel to be a robust and sensitive assay which can be used to analyze casework samples. We conclude that the combination of the obtained predictions of phenotype, biogeographical ancestry, and male lineage can serve as a potential lead in challenging police investigations such as cold cases or cases with no suspect. Full article
(This article belongs to the Section Molecular Genetics and Genomics)
Show Figures

Figure 1

17 pages, 931 KB  
Article
Analysis of Area-Efficiency vs. Unrolling for eSTREAM Hardware Portfolio Stream Ciphers
by Fares Alharbi, Muhammad Khurram Hameed, Anusha Chowdhury, Ayesha Khalid, Anupam Chattopadhyay and Ibrahim Tariq Javed
Electronics 2020, 9(11), 1935; https://doi.org/10.3390/electronics9111935 - 17 Nov 2020
Cited by 5 | Viewed by 2705
Abstract
The demand for low resource devices has increased rapidly due to the advancements in Internet-of-things applications. These devices operate in environments that have limited resources. To ensure security, stream ciphers are implemented on hardware due to their speed and simplicity. Amongst different stream [...] Read more.
The demand for low resource devices has increased rapidly due to the advancements in Internet-of-things applications. These devices operate in environments that have limited resources. To ensure security, stream ciphers are implemented on hardware due to their speed and simplicity. Amongst different stream ciphers, the eSTREAM ciphers stand due to their frugal implementations. This work probes the effect of unrolling on the efficiency of eSTREAM ciphers, including Trivium, Grain (Grain 80 and Grain 128) and MICKEY (MICKEY 2.0 and MICKEY-128 2.0). It addresses the question of optimal unrolling for designing high-performance stream ciphers. The increase in the area consumption is also bench-marked. The analysis is conducted to identify efficient design principles for ciphers. We experimentally show that the resulting performance after unrolling may disagree with the theoretical prediction when the effects of technology library are considered. We report pre-layout synthesis results on 65 and 130 nm ASIC technology as well as synthesis results for Xilinx FPGA platform in support of our claim. Based on our findings, cipher design and implementation suggestions are proposed to aid hardware designers. Furthermore, we explore why and where area-efficiency for these ciphers saturate. Full article
(This article belongs to the Section Computer Science & Engineering)
Show Figures

Figure 1

14 pages, 419 KB  
Article
Towards Secure and Privacy-Preserving IoT Enabled Smart Home: Architecture and Experimental Study
by Mamun Abu-Tair, Soufiene Djahel, Philip Perry, Bryan Scotney, Unsub Zia, Jorge Martinez Carracedo and Ali Sajjad
Sensors 2020, 20(21), 6131; https://doi.org/10.3390/s20216131 - 28 Oct 2020
Cited by 25 | Viewed by 8333
Abstract
Internet of Things (IoT) technology is increasingly pervasive in all aspects of our life and its usage is anticipated to significantly increase in future Smart Cities to support their myriad of revolutionary applications. This paper introduces a new architecture that can support several [...] Read more.
Internet of Things (IoT) technology is increasingly pervasive in all aspects of our life and its usage is anticipated to significantly increase in future Smart Cities to support their myriad of revolutionary applications. This paper introduces a new architecture that can support several IoT-enabled smart home use cases, with a specified level of security and privacy preservation. The security threats that may target such an architecture are highlighted along with the cryptographic algorithms that can prevent them. An experimental study is performed to provide more insights about the suitability of several lightweight cryptographic algorithms for use in securing the constrained IoT devices used in the proposed architecture. The obtained results showed that many modern lightweight symmetric cryptography algorithms, as CLEFIA and TRIVIUM, are optimized for hardware implementations and can consume up to 10 times more energy than the legacy techniques when they are implemented in software. Moreover, the experiments results highlight that CLEFIA significantly outperforms TRIVIUM under all of the investigated test cases, and the latter performs 100 times worse than the legacy cryptographic algorithms tested. Full article
Show Figures

Figure 1

16 pages, 276 KB  
Article
“El entendimiento con el qual me conoscan”: Intellectual Mysticism in the Visión Deleitable
by Michelle M. Hamilton
Religions 2020, 11(1), 5; https://doi.org/10.3390/rel11010005 - 20 Dec 2019
Viewed by 2948
Abstract
Visión deleytable is a fictional tale based in the Aristotelian philosophical and Neoplatonic mystical beliefs of the Judeo-Arabic tradition of medieval Iberia. This fifteenth-century work of imaginative fiction, a “best-seller” among Iberian readers, tells of the ascent of the active intellect to the [...] Read more.
Visión deleytable is a fictional tale based in the Aristotelian philosophical and Neoplatonic mystical beliefs of the Judeo-Arabic tradition of medieval Iberia. This fifteenth-century work of imaginative fiction, a “best-seller” among Iberian readers, tells of the ascent of the active intellect to the celestial spheres and an experience of God. In this narrative, knowledge of the Latin trivium and quadrivium are combined with that of the Arabo-Andalusi philosophic traditions. Particularly noteworthy is the author, De la Torre’s extensive use of Maimonides’ work, the Guide of the Perplexed, as a source for the wisdom revealed in the Visión deleytable. While Maimonides’ position on the mystic experience is debated by contemporary scholars, in the present study I explore how the concept of intellectual mysticism, applied to the Neoplatonic/Aristotelian model of the intellect’s conjunction with the divine as found in Maimonides’ work, also describes the goal toward which the protagonist (and reader) of the Visión deleytable strive. As such, the Visión deleytable reveals how this notion of human-divine union (most notably in the concept of the “prophet-angel”) from the Judeo-Andalusi tradition, transmitted in Arabic and Hebrew, was translated into Spanish and adopted into the Catholic and converso frameworks of the Visión deleytable in fifteenth-century Iberia. Full article
(This article belongs to the Special Issue Mysticism and Spirituality in Medieval Spain)
Back to TopTop