{"id":"https://openalex.org/W3092142741","doi":"https://doi.org/10.1109/dac18072.2020.9218600","title":"LoPher: SAT-Hardened Logic Embedding on Block Ciphers","display_name":"LoPher: SAT-Hardened Logic Embedding on Block Ciphers","publication_year":2020,"publication_date":"2020-07-01","ids":{"openalex":"https://openalex.org/W3092142741","doi":"https://doi.org/10.1109/dac18072.2020.9218600","mag":"3092142741"},"language":"en","primary_location":{"id":"doi:10.1109/dac18072.2020.9218600","is_oa":false,"landing_page_url":"https://doi.org/10.1109/dac18072.2020.9218600","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 57th ACM/IEEE Design Automation Conference (DAC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5083907788","display_name":"Akashdeep Saha","orcid":"https://orcid.org/0000-0003-2060-2773"},"institutions":[{"id":"https://openalex.org/I145894827","display_name":"Indian Institute of Technology Kharagpur","ror":"https://ror.org/03w5sq511","country_code":"IN","type":"education","lineage":["https://openalex.org/I145894827"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Akashdeep Saha","raw_affiliation_strings":["Department of Computer Science and Engineering, Indian Institute of Technology, Kharagpur, Kharagpur, West Bengal, India"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Indian Institute of Technology, Kharagpur, Kharagpur, West Bengal, India","institution_ids":["https://openalex.org/I145894827"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101432394","display_name":"Sayandeep Saha","orcid":"https://orcid.org/0000-0002-5535-1102"},"institutions":[{"id":"https://openalex.org/I145894827","display_name":"Indian Institute of Technology Kharagpur","ror":"https://ror.org/03w5sq511","country_code":"IN","type":"education","lineage":["https://openalex.org/I145894827"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Sayandeep Saha","raw_affiliation_strings":["Department of Computer Science and Engineering, Indian Institute of Technology, Kharagpur, Kharagpur, West Bengal, India"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Indian Institute of Technology, Kharagpur, Kharagpur, West Bengal, India","institution_ids":["https://openalex.org/I145894827"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5089810331","display_name":"Siddhartha Chowdhury","orcid":null},"institutions":[{"id":"https://openalex.org/I145894827","display_name":"Indian Institute of Technology Kharagpur","ror":"https://ror.org/03w5sq511","country_code":"IN","type":"education","lineage":["https://openalex.org/I145894827"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Siddhartha Chowdhury","raw_affiliation_strings":["Department of Computer Science and Engineering, Indian Institute of Technology, Kharagpur, Kharagpur, West Bengal, India"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Indian Institute of Technology, Kharagpur, Kharagpur, West Bengal, India","institution_ids":["https://openalex.org/I145894827"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5078971402","display_name":"Debdeep Mukhopadhyay","orcid":"https://orcid.org/0000-0002-6499-8346"},"institutions":[{"id":"https://openalex.org/I145894827","display_name":"Indian Institute of Technology Kharagpur","ror":"https://ror.org/03w5sq511","country_code":"IN","type":"education","lineage":["https://openalex.org/I145894827"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Debdeep Mukhopadhyay","raw_affiliation_strings":["Department of Computer Science and Engineering, Indian Institute of Technology, Kharagpur, Kharagpur, West Bengal, India"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Indian Institute of Technology, Kharagpur, Kharagpur, West Bengal, India","institution_ids":["https://openalex.org/I145894827"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5067730042","display_name":"Bhargab B. Bhattacharya","orcid":"https://orcid.org/0000-0002-5890-2483"},"institutions":[{"id":"https://openalex.org/I145894827","display_name":"Indian Institute of Technology Kharagpur","ror":"https://ror.org/03w5sq511","country_code":"IN","type":"education","lineage":["https://openalex.org/I145894827"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Bhargab B Bhattacharya","raw_affiliation_strings":["Department of Computer Science and Engineering, Indian Institute of Technology, Kharagpur, Kharagpur, West Bengal, India"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Indian Institute of Technology, Kharagpur, Kharagpur, West Bengal, India","institution_ids":["https://openalex.org/I145894827"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5083907788"],"corresponding_institution_ids":["https://openalex.org/I145894827"],"apc_list":null,"apc_paid":null,"fwci":4.3897,"has_fulltext":false,"cited_by_count":29,"citation_normalized_percentile":{"value":0.95383275,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":97,"max":99},"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9984999895095825,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T14117","display_name":"Integrated Circuits and Semiconductor Failure Analysis","score":0.9794999957084656,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/block-cipher","display_name":"Block cipher","score":0.7082251906394958},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.678187906742096},{"id":"https://openalex.org/keywords/combinational-logic","display_name":"Combinational logic","score":0.6319601535797119},{"id":"https://openalex.org/keywords/pseudorandom-permutation","display_name":"Pseudorandom permutation","score":0.5398672223091125},{"id":"https://openalex.org/keywords/key-schedule","display_name":"Key schedule","score":0.5188207030296326},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.4575480818748474},{"id":"https://openalex.org/keywords/permutation","display_name":"Permutation (music)","score":0.4483557343482971},{"id":"https://openalex.org/keywords/cipher","display_name":"Cipher","score":0.43209075927734375},{"id":"https://openalex.org/keywords/block","display_name":"Block (permutation group theory)","score":0.4275059700012207},{"id":"https://openalex.org/keywords/signature","display_name":"Signature (topology)","score":0.4273834228515625},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.419254332780838},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.4098376929759979},{"id":"https://openalex.org/keywords/logic-gate","display_name":"Logic gate","score":0.36972013115882874},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.3300411105155945},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.19905397295951843},{"id":"https://openalex.org/keywords/differential-cryptanalysis","display_name":"Differential cryptanalysis","score":0.13235360383987427},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.11549633741378784}],"concepts":[{"id":"https://openalex.org/C106544461","wikidata":"https://www.wikidata.org/wiki/Q543151","display_name":"Block cipher","level":3,"score":0.7082251906394958},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.678187906742096},{"id":"https://openalex.org/C81409106","wikidata":"https://www.wikidata.org/wiki/Q76505","display_name":"Combinational logic","level":3,"score":0.6319601535797119},{"id":"https://openalex.org/C25818197","wikidata":"https://www.wikidata.org/wiki/Q7255477","display_name":"Pseudorandom permutation","level":4,"score":0.5398672223091125},{"id":"https://openalex.org/C112145980","wikidata":"https://www.wikidata.org/wiki/Q2569509","display_name":"Key schedule","level":5,"score":0.5188207030296326},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.4575480818748474},{"id":"https://openalex.org/C21308566","wikidata":"https://www.wikidata.org/wiki/Q7169365","display_name":"Permutation (music)","level":2,"score":0.4483557343482971},{"id":"https://openalex.org/C2780221543","wikidata":"https://www.wikidata.org/wiki/Q4681865","display_name":"Cipher","level":3,"score":0.43209075927734375},{"id":"https://openalex.org/C2777210771","wikidata":"https://www.wikidata.org/wiki/Q4927124","display_name":"Block (permutation group theory)","level":2,"score":0.4275059700012207},{"id":"https://openalex.org/C2779696439","wikidata":"https://www.wikidata.org/wiki/Q7512811","display_name":"Signature (topology)","level":2,"score":0.4273834228515625},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.419254332780838},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.4098376929759979},{"id":"https://openalex.org/C131017901","wikidata":"https://www.wikidata.org/wiki/Q170451","display_name":"Logic gate","level":2,"score":0.36972013115882874},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.3300411105155945},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.19905397295951843},{"id":"https://openalex.org/C36123800","wikidata":"https://www.wikidata.org/wiki/Q1224471","display_name":"Differential cryptanalysis","level":4,"score":0.13235360383987427},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.11549633741378784},{"id":"https://openalex.org/C24890656","wikidata":"https://www.wikidata.org/wiki/Q82811","display_name":"Acoustics","level":1,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/dac18072.2020.9218600","is_oa":false,"landing_page_url":"https://doi.org/10.1109/dac18072.2020.9218600","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 57th ACM/IEEE Design Automation Conference (DAC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.75,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":16,"referenced_works":["https://openalex.org/W1524250393","https://openalex.org/W1873852107","https://openalex.org/W1894646615","https://openalex.org/W1959383191","https://openalex.org/W2011849452","https://openalex.org/W2126693329","https://openalex.org/W2419784917","https://openalex.org/W2586046457","https://openalex.org/W2708742051","https://openalex.org/W2741711485","https://openalex.org/W2741840250","https://openalex.org/W2747980214","https://openalex.org/W2766393343","https://openalex.org/W2903107655","https://openalex.org/W2942387991","https://openalex.org/W2945305016"],"related_works":["https://openalex.org/W2964609758","https://openalex.org/W2910464690","https://openalex.org/W2807501579","https://openalex.org/W3011345142","https://openalex.org/W2134038088","https://openalex.org/W1638546798","https://openalex.org/W4390979909","https://openalex.org/W4389575897","https://openalex.org/W2156908834","https://openalex.org/W234321120"],"abstract_inverted_index":{"Block":[0],"ciphers":[1],"are":[2],"widely":[3],"regarded":[4],"as":[5],"concrete":[6],"realizations":[7],"of":[8,21,43,77,87,103],"pseudorandom":[9],"permutations":[10],"with":[11],"established":[12],"security":[13,73],"features.":[14],"However,":[15],"their":[16],"applicability":[17],"outside":[18],"the":[19,36,69,78,85,104,127],"domain":[20],"encryption":[22],"has":[23],"not":[24],"been":[25],"explored":[26],"so":[27],"far.":[28],"In":[29],"this":[30],"paper,":[31],"we":[32,110],"open":[33],"up,":[34],"for":[35],"first":[37],"time,":[38],"an":[39,107],"entirely":[40],"novel":[41],"application":[42,86],"them":[44],"to":[45,101,123],"logic":[46,134],"hiding.":[47],"We":[48],"show":[49],"that":[50,98,102],"a":[51,59,63,88,92,112],"combinational":[52,113],"circuit":[53,80],"can":[54],"always":[55],"be":[56,124],"embedded":[57,79],"within":[58],"block":[60],"cipher":[61,70],"having":[62],"bit-permutation":[64],"based":[65],"diffusion":[66],"layer,":[67],"preserving":[68],"structure":[71],"and":[72,130],"properties.":[74],"The":[75,116],"functionality":[76],"becomes":[81],"transparent":[82],"only":[83],"on":[84,133],"secret":[89],"key,":[90],"whereas":[91],"wrong":[93],"key":[94],"will":[95],"cause":[96],"behaviour":[97],"is":[99,120],"uncorrelated":[100],"circuit.":[105],"As":[106],"immediate":[108],"application,":[109],"propose":[111],"logic-locking":[114],"scheme.":[115],"proposed":[117],"locking":[118],"scheme":[119],"also":[121],"found":[122],"robust":[125],"against":[126],"state-of-the-art":[128],"(SAT-assisted":[129],"other)":[131],"attacks":[132],"locks.":[135]},"counts_by_year":[{"year":2025,"cited_by_count":4},{"year":2024,"cited_by_count":6},{"year":2023,"cited_by_count":5},{"year":2022,"cited_by_count":8},{"year":2021,"cited_by_count":6}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
