{"id":"https://openalex.org/W7125976963","doi":"https://doi.org/10.1109/access.2026.3659061","title":"Seed Recovery From Probabilistic Leakage via Resource-Aware, Posterior-Guided Enumeration","display_name":"Seed Recovery From Probabilistic Leakage via Resource-Aware, Posterior-Guided Enumeration","publication_year":2026,"publication_date":"2026-01-01","ids":{"openalex":"https://openalex.org/W7125976963","doi":"https://doi.org/10.1109/access.2026.3659061"},"language":"en","primary_location":{"id":"doi:10.1109/access.2026.3659061","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2026.3659061","pdf_url":null,"source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.1109/access.2026.3659061","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Val\u00e9rie Gauthier-Uma\u00f1a","orcid":"https://orcid.org/0000-0003-0909-7091"},"institutions":[{"id":"https://openalex.org/I162096671","display_name":"Universidad de Los Andes","ror":"https://ror.org/02mhbdp94","country_code":"CO","type":"education","lineage":["https://openalex.org/I162096671"]}],"countries":["CO"],"is_corresponding":true,"raw_author_name":"Val\u00e9rie Gauthier-Uma\u00f1a","raw_affiliation_strings":["Department of Systems and Computing Engineering, Universidad de los Andes, Bogot&#x00E1;, Colombia"],"raw_orcid":"https://orcid.org/0000-0003-0909-7091","affiliations":[{"raw_affiliation_string":"Department of Systems and Computing Engineering, Universidad de los Andes, Bogot&#x00E1;, Colombia","institution_ids":["https://openalex.org/I162096671"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5124144455","display_name":"Andres M. Ochoa-Toro","orcid":null},"institutions":[{"id":"https://openalex.org/I162096671","display_name":"Universidad de Los Andes","ror":"https://ror.org/02mhbdp94","country_code":"CO","type":"education","lineage":["https://openalex.org/I162096671"]}],"countries":["CO"],"is_corresponding":false,"raw_author_name":"Andr\u00e9s M. Ochoa-Toro","raw_affiliation_strings":["Department of Systems and Computing Engineering, Universidad de los Andes, Bogot&#x00E1;, Colombia"],"raw_orcid":"https://orcid.org/0009-0008-6785-8972","affiliations":[{"raw_affiliation_string":"Department of Systems and Computing Engineering, Universidad de los Andes, Bogot&#x00E1;, Colombia","institution_ids":["https://openalex.org/I162096671"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5065022234","display_name":"Ricardo Villanueva-Polanco","orcid":"https://orcid.org/0000-0002-8682-4830"},"institutions":[{"id":"https://openalex.org/I142879360","display_name":"Universidad del Norte","ror":"https://ror.org/031e6xm45","country_code":"CO","type":"education","lineage":["https://openalex.org/I142879360"]}],"countries":["CO"],"is_corresponding":false,"raw_author_name":"Ricardo Villanueva-Polanco","raw_affiliation_strings":["Department of Systems and Computing Engineering, Universidad del Norte, Barranquilla, Colombia"],"raw_orcid":"https://orcid.org/0000-0002-8682-4830","affiliations":[{"raw_affiliation_string":"Department of Systems and Computing Engineering, Universidad del Norte, Barranquilla, Colombia","institution_ids":["https://openalex.org/I142879360"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":[],"corresponding_institution_ids":["https://openalex.org/I162096671"],"apc_list":{"value":1850,"currency":"USD","value_usd":1850},"apc_paid":{"value":1850,"currency":"USD","value_usd":1850},"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.16348725,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"14","issue":null,"first_page":"17264","last_page":"17277"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.8069999814033508,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.8069999814033508,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.05829999968409538,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.051500000059604645,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/probabilistic-logic","display_name":"Probabilistic logic","score":0.7005000114440918},{"id":"https://openalex.org/keywords/information-leakage","display_name":"Information leakage","score":0.6488000154495239},{"id":"https://openalex.org/keywords/leakage","display_name":"Leakage (economics)","score":0.6424000263214111},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.6097999811172485},{"id":"https://openalex.org/keywords/bitwise-operation","display_name":"Bitwise operation","score":0.5781999826431274},{"id":"https://openalex.org/keywords/enumeration","display_name":"Enumeration","score":0.5012999773025513},{"id":"https://openalex.org/keywords/oracle","display_name":"Oracle","score":0.4657000005245209},{"id":"https://openalex.org/keywords/automatic-summarization","display_name":"Automatic summarization","score":0.46549999713897705},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.4361000061035156}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7190999984741211},{"id":"https://openalex.org/C49937458","wikidata":"https://www.wikidata.org/wiki/Q2599292","display_name":"Probabilistic logic","level":2,"score":0.7005000114440918},{"id":"https://openalex.org/C2779201187","wikidata":"https://www.wikidata.org/wiki/Q2775060","display_name":"Information leakage","level":2,"score":0.6488000154495239},{"id":"https://openalex.org/C2777042071","wikidata":"https://www.wikidata.org/wiki/Q6509304","display_name":"Leakage (economics)","level":2,"score":0.6424000263214111},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.6097999811172485},{"id":"https://openalex.org/C134765980","wikidata":"https://www.wikidata.org/wiki/Q879126","display_name":"Bitwise operation","level":2,"score":0.5781999826431274},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.5235000252723694},{"id":"https://openalex.org/C156340839","wikidata":"https://www.wikidata.org/wiki/Q2704791","display_name":"Enumeration","level":2,"score":0.5012999773025513},{"id":"https://openalex.org/C55166926","wikidata":"https://www.wikidata.org/wiki/Q2892946","display_name":"Oracle","level":2,"score":0.4657000005245209},{"id":"https://openalex.org/C170858558","wikidata":"https://www.wikidata.org/wiki/Q1394144","display_name":"Automatic summarization","level":2,"score":0.46549999713897705},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.4361000061035156},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3686999976634979},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.3671000003814697},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.36340001225471497},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.3571999967098236},{"id":"https://openalex.org/C15927051","wikidata":"https://www.wikidata.org/wiki/Q246593","display_name":"Cryptographic primitive","level":4,"score":0.34869998693466187},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.33730000257492065},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.3370000123977661},{"id":"https://openalex.org/C124304363","wikidata":"https://www.wikidata.org/wiki/Q673661","display_name":"Abstraction","level":2,"score":0.33640000224113464},{"id":"https://openalex.org/C107673813","wikidata":"https://www.wikidata.org/wiki/Q812534","display_name":"Bayesian probability","level":2,"score":0.33239999413490295},{"id":"https://openalex.org/C94284585","wikidata":"https://www.wikidata.org/wiki/Q228184","display_name":"Random oracle","level":4,"score":0.32109999656677246},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.3091000020503998},{"id":"https://openalex.org/C162838799","wikidata":"https://www.wikidata.org/wiki/Q596077","display_name":"Counterexample","level":2,"score":0.30329999327659607},{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.30250000953674316},{"id":"https://openalex.org/C160713754","wikidata":"https://www.wikidata.org/wiki/Q1389965","display_name":"Maintainability","level":2,"score":0.3012000024318695},{"id":"https://openalex.org/C2775928411","wikidata":"https://www.wikidata.org/wiki/Q2041312","display_name":"Fault injection","level":3,"score":0.29190000891685486},{"id":"https://openalex.org/C207468940","wikidata":"https://www.wikidata.org/wiki/Q869370","display_name":"Brute-force attack","level":3,"score":0.2759999930858612},{"id":"https://openalex.org/C179799912","wikidata":"https://www.wikidata.org/wiki/Q205084","display_name":"Computational complexity theory","level":2,"score":0.2741999924182892},{"id":"https://openalex.org/C60782215","wikidata":"https://www.wikidata.org/wiki/Q3333679","display_name":"Probabilistic method","level":3,"score":0.2685000002384186},{"id":"https://openalex.org/C115537543","wikidata":"https://www.wikidata.org/wiki/Q165596","display_name":"Cache","level":2,"score":0.2614000141620636},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.2563000023365021}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/access.2026.3659061","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2026.3659061","pdf_url":null,"source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:834c1a58801b4fd8a2e2ec78a1dc43f8","is_oa":true,"landing_page_url":"https://doaj.org/article/834c1a58801b4fd8a2e2ec78a1dc43f8","pdf_url":null,"source":{"id":"https://openalex.org/S4306401280","display_name":"DOAJ (DOAJ: Directory of Open Access Journals)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IEEE Access, Vol 14, Pp 17264-17277 (2026)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1109/access.2026.3659061","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2026.3659061","pdf_url":null,"source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":25,"referenced_works":["https://openalex.org/W22542791","https://openalex.org/W67496578","https://openalex.org/W1584522027","https://openalex.org/W1593044649","https://openalex.org/W1710934224","https://openalex.org/W1896786365","https://openalex.org/W2115175687","https://openalex.org/W2143316545","https://openalex.org/W2175377689","https://openalex.org/W2283459741","https://openalex.org/W2768685646","https://openalex.org/W2972877722","https://openalex.org/W2978151172","https://openalex.org/W3035461616","https://openalex.org/W3107121737","https://openalex.org/W3115014565","https://openalex.org/W4229941893","https://openalex.org/W4294698941","https://openalex.org/W4312868516","https://openalex.org/W4320485130","https://openalex.org/W4403174992","https://openalex.org/W4405944772","https://openalex.org/W4406444904","https://openalex.org/W4412177448","https://openalex.org/W7117152882"],"related_works":[],"abstract_inverted_index":{"Physical":[0],"and":[1,98,117,128,141,196,226],"side-channel":[2,100],"attacks":[3],"often":[4],"expose":[5],"noisy":[6],"or":[7],"partial":[8,95],"information":[9,85],"about":[10,50,86],"cryptographic":[11],"secrets":[12],"rather":[13],"than":[14],"exact":[15],"key":[16,44,96],"values.":[17],"As":[18],"the":[19,31,56,66,133,136,199,206],"deployment":[20],"of":[21,34,59,138],"post-quantum":[22,191],"cryptography":[23],"(PQC)":[24],"progresses,":[25],"this":[26,103],"risk":[27],"is":[28],"amplified":[29],"by":[30],"widespread":[32],"use":[33],"compact":[35],"secret":[36],"seeds":[37,52],"that":[38,111,156],"are":[39],"deterministically":[40],"expanded":[41],"into":[42],"large":[43],"material.":[45],"Even":[46],"probabilistic,":[47],"bitwise":[48,67],"leakage":[49,69,77,140,214],"such":[51],"may":[53],"therefore":[54],"reduce":[55],"effective":[57],"security":[58],"deployed":[60,225],"PQC":[61,228],"implementations.":[62],"This":[63],"work":[64],"adopts":[65],"Bayesian":[68],"model":[70],"(BBLM)":[71],"as":[72,89],"a":[73,87,107,121,217],"practical":[74,179],"abstraction":[75],"for":[76,145,173,220],"scenarios":[78],"in":[79,92,135,189,224],"which":[80],"adversaries":[81],"obtain":[82],"per-bit":[83],"posterior":[84],"secret,":[88],"commonly":[90],"occurs":[91],"cold-boot":[93,139,204],"attacks,":[94,205],"exposure,":[97],"classifier-based":[99],"analysis.":[101],"Within":[102],"model,":[104],"we":[105,181],"study":[106],"posterior-guided":[108,157],"seed-recovery":[109],"framework":[110,134,207],"ranks":[112],"candidates":[113],"using":[114],"likelihood-based":[115],"scores":[116],"validates":[118],"them":[119],"through":[120],"deterministic":[122,184],"public-key":[123],"oracle":[124],"under":[125],"explicit":[126],"time":[127],"memory":[129],"constraints.":[130],"We":[131],"instantiate":[132],"context":[137],"evaluate":[142],"its":[143],"behavior":[144],"abstract":[146],"seed":[147],"lengths":[148],"up":[149],"to":[150,169,211],"256":[151],"bits.":[152],"The":[153],"results":[154],"indicate":[155],"enumeration":[158],"combined":[159],"with":[160],"oracle-based":[161],"validation":[162,185],"can":[163],"substantially":[164],"improve":[165],"recovery":[166],"efficiency":[167],"compared":[168],"uninformed":[170],"search,":[171],"even":[172],"algebraically":[174],"structureless":[175],"seeds.":[176],"To":[177],"illustrate":[178],"applicability,":[180],"describe":[182],"how":[183],"oracles":[186],"arise":[187],"naturally":[188],"representative":[190],"schemes,":[192],"including":[193],"RYDE,":[194],"UOV,":[195],"FAEST.":[197],"While":[198],"experimental":[200],"evaluation":[201],"focuses":[202],"on":[203],"applies":[208],"more":[209],"broadly":[210],"other":[212],"probabilistic":[213],"sources,":[215],"providing":[216],"resource-aware":[218],"methodology":[219],"assessing":[221],"key-recovery":[222],"risks":[223],"emerging":[227],"systems.":[229]},"counts_by_year":[],"updated_date":"2026-05-06T08:25:59.206177","created_date":"2026-01-29T00:00:00"}
