{"id":"https://openalex.org/W4404373277","doi":"https://doi.org/10.1007/s13389-024-00366-0","title":"Remote side-channel analysis of the loop PUF using a TDC-based voltage sensor","display_name":"Remote side-channel analysis of the loop PUF using a TDC-based voltage sensor","publication_year":2024,"publication_date":"2024-11-14","ids":{"openalex":"https://openalex.org/W4404373277","doi":"https://doi.org/10.1007/s13389-024-00366-0"},"language":"en","primary_location":{"id":"doi:10.1007/s13389-024-00366-0","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s13389-024-00366-0","pdf_url":"https://link.springer.com/content/pdf/10.1007/s13389-024-00366-0.pdf","source":{"id":"https://openalex.org/S2764800400","display_name":"Journal of Cryptographic Engineering","issn_l":"2190-8508","issn":["2190-8508","2190-8516"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cryptographic Engineering","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://link.springer.com/content/pdf/10.1007/s13389-024-00366-0.pdf","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5002115587","display_name":"Matthias Probst","orcid":"https://orcid.org/0000-0001-5747-0730"},"institutions":[{"id":"https://openalex.org/I62916508","display_name":"Technical University of Munich","ror":"https://ror.org/02kkvpp62","country_code":"DE","type":"education","lineage":["https://openalex.org/I62916508"]}],"countries":["DE"],"is_corresponding":true,"raw_author_name":"Matthias Probst","raw_affiliation_strings":["TUM School of Computation, Information and Technology, Technical University of Munich, Munich, Germany"],"affiliations":[{"raw_affiliation_string":"TUM School of Computation, Information and Technology, Technical University of Munich, Munich, Germany","institution_ids":["https://openalex.org/I62916508"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5061923827","display_name":"Lars Tebelmann","orcid":"https://orcid.org/0000-0003-2014-7184"},"institutions":[{"id":"https://openalex.org/I62916508","display_name":"Technical University of Munich","ror":"https://ror.org/02kkvpp62","country_code":"DE","type":"education","lineage":["https://openalex.org/I62916508"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Lars Tebelmann","raw_affiliation_strings":["TUM School of Computation, Information and Technology, Technical University of Munich, Munich, Germany"],"affiliations":[{"raw_affiliation_string":"TUM School of Computation, Information and Technology, Technical University of Munich, Munich, Germany","institution_ids":["https://openalex.org/I62916508"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5065900338","display_name":"Moritz Wettermann","orcid":"https://orcid.org/0000-0002-8792-6468"},"institutions":[{"id":"https://openalex.org/I62916508","display_name":"Technical University of Munich","ror":"https://ror.org/02kkvpp62","country_code":"DE","type":"education","lineage":["https://openalex.org/I62916508"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Moritz Wettermann","raw_affiliation_strings":["TUM School of Computation, Information and Technology, Technical University of Munich, Munich, Germany"],"affiliations":[{"raw_affiliation_string":"TUM School of Computation, Information and Technology, Technical University of Munich, Munich, Germany","institution_ids":["https://openalex.org/I62916508"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5039512067","display_name":"Michael Pehl","orcid":"https://orcid.org/0000-0001-6100-7714"},"institutions":[{"id":"https://openalex.org/I62916508","display_name":"Technical University of Munich","ror":"https://ror.org/02kkvpp62","country_code":"DE","type":"education","lineage":["https://openalex.org/I62916508"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Michael Pehl","raw_affiliation_strings":["TUM School of Computation, Information and Technology, Technical University of Munich, Munich, Germany"],"affiliations":[{"raw_affiliation_string":"TUM School of Computation, Information and Technology, Technical University of Munich, Munich, Germany","institution_ids":["https://openalex.org/I62916508"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5002115587"],"corresponding_institution_ids":["https://openalex.org/I62916508"],"apc_list":{"value":2390,"currency":"EUR","value_usd":2990},"apc_paid":{"value":2390,"currency":"EUR","value_usd":2990},"fwci":0.4962,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.65557779,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":"15","issue":"1","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T14117","display_name":"Integrated Circuits and Semiconductor Failure Analysis","score":0.9984999895095825,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12495","display_name":"Electrostatic Discharge in Electronics","score":0.998199999332428,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/side-channel-attack","display_name":"Side channel attack","score":0.7791454792022705},{"id":"https://openalex.org/keywords/loop","display_name":"Loop (graph theory)","score":0.6298206448554993},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5407921671867371},{"id":"https://openalex.org/keywords/channel","display_name":"Channel (broadcasting)","score":0.5043343305587769},{"id":"https://openalex.org/keywords/voltage","display_name":"Voltage","score":0.4876631498336792},{"id":"https://openalex.org/keywords/electronic-engineering","display_name":"Electronic engineering","score":0.43413984775543213},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.3515564799308777},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.25629156827926636},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.222461998462677},{"id":"https://openalex.org/keywords/electrical-engineering","display_name":"Electrical engineering","score":0.20534491539001465},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.16965362429618835},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.16420432925224304},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.15110009908676147}],"concepts":[{"id":"https://openalex.org/C49289754","wikidata":"https://www.wikidata.org/wiki/Q2267081","display_name":"Side channel attack","level":3,"score":0.7791454792022705},{"id":"https://openalex.org/C184670325","wikidata":"https://www.wikidata.org/wiki/Q512604","display_name":"Loop (graph theory)","level":2,"score":0.6298206448554993},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5407921671867371},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.5043343305587769},{"id":"https://openalex.org/C165801399","wikidata":"https://www.wikidata.org/wiki/Q25428","display_name":"Voltage","level":2,"score":0.4876631498336792},{"id":"https://openalex.org/C24326235","wikidata":"https://www.wikidata.org/wiki/Q126095","display_name":"Electronic engineering","level":1,"score":0.43413984775543213},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.3515564799308777},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.25629156827926636},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.222461998462677},{"id":"https://openalex.org/C119599485","wikidata":"https://www.wikidata.org/wiki/Q43035","display_name":"Electrical engineering","level":1,"score":0.20534491539001465},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.16965362429618835},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.16420432925224304},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.15110009908676147},{"id":"https://openalex.org/C114614502","wikidata":"https://www.wikidata.org/wiki/Q76592","display_name":"Combinatorics","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1007/s13389-024-00366-0","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s13389-024-00366-0","pdf_url":"https://link.springer.com/content/pdf/10.1007/s13389-024-00366-0.pdf","source":{"id":"https://openalex.org/S2764800400","display_name":"Journal of Cryptographic Engineering","issn_l":"2190-8508","issn":["2190-8508","2190-8516"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cryptographic Engineering","raw_type":"journal-article"},{"id":"pmh:oai:mediatum.ub.tum.de:node/1762690","is_oa":false,"landing_page_url":"https://mediatum.ub.tum.de/1762690","pdf_url":null,"source":{"id":"https://openalex.org/S4377196330","display_name":"mediaTUM  (Technical University of Munich)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I62916508","host_organization_name":"Technical University of Munich","host_organization_lineage":["https://openalex.org/I62916508"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"}],"best_oa_location":{"id":"doi:10.1007/s13389-024-00366-0","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s13389-024-00366-0","pdf_url":"https://link.springer.com/content/pdf/10.1007/s13389-024-00366-0.pdf","source":{"id":"https://openalex.org/S2764800400","display_name":"Journal of Cryptographic Engineering","issn_l":"2190-8508","issn":["2190-8508","2190-8516"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cryptographic Engineering","raw_type":"journal-article"},"sustainable_development_goals":[{"score":0.6800000071525574,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[{"id":"https://openalex.org/F4320323383","display_name":"Technische Universit\u00e4t M\u00fcnchen","ror":"https://ror.org/02kkvpp62"}],"has_content":{"grobid_xml":false,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4404373277.pdf"},"referenced_works_count":21,"referenced_works":["https://openalex.org/W25365497","https://openalex.org/W1562542037","https://openalex.org/W1579766512","https://openalex.org/W2056298050","https://openalex.org/W2069456883","https://openalex.org/W2156435621","https://openalex.org/W2510962904","https://openalex.org/W2615189621","https://openalex.org/W2794898833","https://openalex.org/W2798781612","https://openalex.org/W2964398013","https://openalex.org/W2990600596","https://openalex.org/W3006293286","https://openalex.org/W3013776608","https://openalex.org/W3162238133","https://openalex.org/W3183466684","https://openalex.org/W3193645816","https://openalex.org/W3209573286","https://openalex.org/W4212808686","https://openalex.org/W4308219633","https://openalex.org/W4311806822"],"related_works":["https://openalex.org/W4323824501","https://openalex.org/W24774503","https://openalex.org/W2355552010","https://openalex.org/W2136687465","https://openalex.org/W3016859066","https://openalex.org/W5280335","https://openalex.org/W2014821076","https://openalex.org/W4200321003","https://openalex.org/W4400339423","https://openalex.org/W3215861253"],"abstract_inverted_index":{"Abstract":[0],"FPGAs":[1],"promise":[2],"significant":[3],"performance":[4,166],"improvements":[5],"for":[6,125,134],"several":[7],"computations":[8],"in":[9,16,37,56,98,109,254,268],"cloud":[10,38],"applications.":[11],"However,":[12],"their":[13],"shared":[14],"use":[15],"multi-tenant":[17,256],"scenarios":[18,39],"makes":[19],"them":[20],"susceptible":[21],"to":[22,34,239,260],"attacks.":[23],"Different":[24],"from":[25,45,199],"classical":[26,168],"scenarios,":[27],"where":[28],"the":[29,35,40,57,69,73,83,93,116,126,148,165,174,197,205,215,228,234,237,245,269],"attacker":[30,64],"has":[31],"hardware":[32],"access":[33],"device,":[36],"attack":[41,111,127,229,238,266],"is":[42,121],"possible":[43],"only":[44],"remote.":[46],"As":[47],"a":[48,89,113,141,152,156,200,255,264],"consequence":[49],"remote":[50,142,153,170,249],"SCA":[51,154,171,250],"attacks":[52,61,97,172,251],"gained":[53],"increasing":[54],"attention":[55],"last":[58],"years.":[59],"These":[60],"exploit":[62],"that":[63,77,248],"and":[65,146,169,182,184,190,195,222],"victim":[66],"share":[67],"with":[68],"same":[70,74],"FPGA":[71,181,257],"also":[72,232],"PDN":[75],"so":[76],"operation-dependent":[78],"voltage":[79,90,158],"fluctuations":[80],"caused":[81],"by":[82,88],"victim\u2019s":[84],"IP":[85],"are":[86],"observable":[87],"sensor":[91],"of":[92,150,167,217,224,236],"attacker.":[94],"While":[95],"previous":[96],"this":[99,105,161],"domain":[100],"focused":[101],"on":[102,112,140,173,227,252],"cryptographic":[103],"algorithms,":[104],"work":[106,193],"provides":[107,212],"insights":[108,213],"an":[110,122],"PUF":[114,176,242],"primitive,":[115],"Loop":[117,175],"PUF.":[118],"This":[119,192],"primitive":[120],"interesting":[123],"target":[124],"since":[128],"it":[129,211],"might":[130],"be":[131,261],"used,":[132],"e.g.,":[133],"storing":[135],"or":[136],"deriving":[137],"secret":[138],"keys":[139],"FPGA.":[143],"We":[144],"introduce":[145],"discuss":[147,185],"setup":[149],"such":[151],"using":[155,177],"TDC-based":[157],"sensor.":[159],"With":[160],"sensor,":[162],"we":[163],"compare":[164],"two":[178],"different":[179],"Artix-7":[180],"demonstrate":[183],"findings":[186],"regarding":[187],"sampling":[188],"frequency":[189],"placement.":[191],"extends":[194],"deepens":[196],"analysis":[198,203],"previously":[201],"published":[202],"at":[204],"ASHES":[206],"Workshop":[207],"2022.":[208],"In":[209],"particular,":[210],"into":[214],"influence":[216],"repeated":[218],"measurements,":[219],"measurement":[220],"time,":[221],"usage":[223],"multiple":[225],"TDCs":[226],"performance.":[230],"It":[231],"discusses":[233],"applicability":[235],"further":[240],"RO-based":[241],"primitives.":[243],"Overall":[244],"results":[246],"show":[247],"PUFs":[253],"scenario":[258],"have":[259],"considered":[262],"as":[263],"severe":[265],"vector":[267],"future.":[270]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2026-03-20T23:20:44.827607","created_date":"2025-10-10T00:00:00"}
