{"id":"https://openalex.org/W4378191832","doi":"https://doi.org/10.1109/host55118.2023.10133696","title":"LEDA: Locking Enabled Differential Analysis of Cryptographic Circuits","display_name":"LEDA: Locking Enabled Differential Analysis of Cryptographic Circuits","publication_year":2023,"publication_date":"2023-05-01","ids":{"openalex":"https://openalex.org/W4378191832","doi":"https://doi.org/10.1109/host55118.2023.10133696"},"language":"en","primary_location":{"id":"doi:10.1109/host55118.2023.10133696","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/host55118.2023.10133696","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5045418076","display_name":"Devanshi Upadhyaya","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Devanshi Upadhyaya","raw_affiliation_strings":["Universit&#x00E4;t Stuttgart,Institut f&#x00FC;r Technische Informatik,Stuttgart,Germany"],"affiliations":[{"raw_affiliation_string":"Universit&#x00E4;t Stuttgart,Institut f&#x00FC;r Technische Informatik,Stuttgart,Germany","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5025049265","display_name":"Ma\u00ebl Gay","orcid":"https://orcid.org/0000-0002-7640-7232"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Ma\u00ebl Gay","raw_affiliation_strings":["Universit&#x00E4;t Stuttgart,Institut f&#x00FC;r Technische Informatik,Stuttgart,Germany"],"affiliations":[{"raw_affiliation_string":"Universit&#x00E4;t Stuttgart,Institut f&#x00FC;r Technische Informatik,Stuttgart,Germany","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5027416202","display_name":"Ilia Polian","orcid":"https://orcid.org/0000-0002-6563-2725"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Ilia Polian","raw_affiliation_strings":["Universit&#x00E4;t Stuttgart,Institut f&#x00FC;r Technische Informatik,Stuttgart,Germany"],"affiliations":[{"raw_affiliation_string":"Universit&#x00E4;t Stuttgart,Institut f&#x00FC;r Technische Informatik,Stuttgart,Germany","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5045418076"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":1.5174,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.80610523,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"249","last_page":"259"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9947999715805054,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9663000106811523,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.7488824725151062},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7243560552597046},{"id":"https://openalex.org/keywords/cryptographic-primitive","display_name":"Cryptographic primitive","score":0.6006841659545898},{"id":"https://openalex.org/keywords/block-cipher","display_name":"Block cipher","score":0.5283870100975037},{"id":"https://openalex.org/keywords/electronic-circuit","display_name":"Electronic circuit","score":0.45305106043815613},{"id":"https://openalex.org/keywords/differential","display_name":"Differential (mechanical device)","score":0.4369134306907654},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3731200098991394},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.34942305088043213},{"id":"https://openalex.org/keywords/computer-engineering","display_name":"Computer engineering","score":0.32997971773147583},{"id":"https://openalex.org/keywords/cryptographic-protocol","display_name":"Cryptographic protocol","score":0.289794921875},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.13012489676475525},{"id":"https://openalex.org/keywords/electrical-engineering","display_name":"Electrical engineering","score":0.0919027030467987}],"concepts":[{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.7488824725151062},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7243560552597046},{"id":"https://openalex.org/C15927051","wikidata":"https://www.wikidata.org/wiki/Q246593","display_name":"Cryptographic primitive","level":4,"score":0.6006841659545898},{"id":"https://openalex.org/C106544461","wikidata":"https://www.wikidata.org/wiki/Q543151","display_name":"Block cipher","level":3,"score":0.5283870100975037},{"id":"https://openalex.org/C134146338","wikidata":"https://www.wikidata.org/wiki/Q1815901","display_name":"Electronic circuit","level":2,"score":0.45305106043815613},{"id":"https://openalex.org/C93226319","wikidata":"https://www.wikidata.org/wiki/Q193137","display_name":"Differential (mechanical device)","level":2,"score":0.4369134306907654},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3731200098991394},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.34942305088043213},{"id":"https://openalex.org/C113775141","wikidata":"https://www.wikidata.org/wiki/Q428691","display_name":"Computer engineering","level":1,"score":0.32997971773147583},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.289794921875},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.13012489676475525},{"id":"https://openalex.org/C119599485","wikidata":"https://www.wikidata.org/wiki/Q43035","display_name":"Electrical engineering","level":1,"score":0.0919027030467987},{"id":"https://openalex.org/C146978453","wikidata":"https://www.wikidata.org/wiki/Q3798668","display_name":"Aerospace engineering","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/host55118.2023.10133696","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/host55118.2023.10133696","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.6700000166893005,"id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":47,"referenced_works":["https://openalex.org/W153933648","https://openalex.org/W596458951","https://openalex.org/W892927939","https://openalex.org/W1483831648","https://openalex.org/W1484814447","https://openalex.org/W1494149221","https://openalex.org/W1524250393","https://openalex.org/W1525447969","https://openalex.org/W1565539145","https://openalex.org/W1605798759","https://openalex.org/W1629301835","https://openalex.org/W1894646615","https://openalex.org/W1976955200","https://openalex.org/W1986199670","https://openalex.org/W2038631119","https://openalex.org/W2039845393","https://openalex.org/W2062272401","https://openalex.org/W2063615695","https://openalex.org/W2064541558","https://openalex.org/W2067276029","https://openalex.org/W2095410905","https://openalex.org/W2099101940","https://openalex.org/W2106409910","https://openalex.org/W2110162979","https://openalex.org/W2111725598","https://openalex.org/W2124954128","https://openalex.org/W2133527541","https://openalex.org/W2139750209","https://openalex.org/W2140345173","https://openalex.org/W2277945859","https://openalex.org/W2343475170","https://openalex.org/W2419784917","https://openalex.org/W2499445168","https://openalex.org/W2615010670","https://openalex.org/W2616325639","https://openalex.org/W2766393343","https://openalex.org/W2971591205","https://openalex.org/W2974242627","https://openalex.org/W3001499944","https://openalex.org/W3103137679","https://openalex.org/W3183146245","https://openalex.org/W4231363479","https://openalex.org/W4252100403","https://openalex.org/W6617964540","https://openalex.org/W6624204130","https://openalex.org/W6675797392","https://openalex.org/W6771761691"],"related_works":["https://openalex.org/W18954787","https://openalex.org/W3138083505","https://openalex.org/W4254460476","https://openalex.org/W2783353176","https://openalex.org/W2339543721","https://openalex.org/W1514794536","https://openalex.org/W2777135250","https://openalex.org/W1829339118","https://openalex.org/W3179891621","https://openalex.org/W4390962791"],"abstract_inverted_index":{"Hardware":[0],"implementations":[1,109],"of":[2,21,24,52,134,143],"cryptographic":[3,67,99,170],"primitives":[4],"require":[5],"protection":[6],"against":[7,33,41,60],"physical":[8],"attacks":[9,148],"and":[10,64,136,141],"supplychain":[11],"threats":[12],"at":[13],"the":[14,19,50,72,76,80],"same":[15],"time.":[16],"This":[17],"raises":[18],"question":[20],"secure":[22],"composability":[23],"different":[25,43],"attack":[26,84,94],"countermeasures,":[27],"i.e.,":[28],"whether":[29],"protecting":[30],"a":[31,42,56,92,131],"circuit":[32,77,108],"one":[34],"threat":[35],"can":[36],"make":[37],"it":[38],"more":[39,177],"vulnerable":[40],"threat.":[44],"In":[45,101,122],"this":[46],"paper,":[47],"we":[48,124],"study":[49],"consequences":[51],"applying":[53],"logic":[54,97,104,162],"locking,":[55],"popular":[57],"design-for-trust":[58],"solution":[59],"intellectual":[61],"property":[62],"piracy":[63],"overproduction,":[65],"to":[66,74,111,167],"circuits.":[68],"We":[69,86,115],"show":[70],"that":[71,146,161],"ability":[73],"unlock":[75],"incorrectly":[78,155],"gives":[79],"adversary":[81],"new":[82,93],"powerful":[83],"options.":[85],"introduce":[87],"L.EDA":[88],"(locking-enabled":[89,127],"differential":[90,128],"analysis),":[91,130],"vector":[95],"on":[96],"locked":[98],"circuits":[100,157],"many":[102],"cases,":[103],"locking":[105,144,163],"has":[106],"made":[107],"prone":[110],"classical":[112],"algebraic":[113],"attacks.":[114],"investigate":[116],"in":[117,169],"depth":[118],"its":[119],"success":[120],"factors.":[121],"addition,":[123],"consider":[125],"L.EDFA":[126],"fault":[129,147],"fault-assisted":[132],"version":[133],"LEDA,":[135],"demonstrate":[137],"for":[138,154],"several":[139],"ciphers":[140],"families":[142],"schemes":[145],"become":[149],"possible":[150],"(or":[151],"consistently":[152],"easier)":[153],"unlocked":[156],"Our":[158],"results":[159],"indicate":[160],"is":[164],"not":[165],"safe":[166],"use":[168],"circuits,":[171],"making":[172],"them":[173],"less":[174],"rather":[175],"than":[176],"secure.":[178]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":2}],"updated_date":"2026-03-25T13:04:00.132906","created_date":"2025-10-10T00:00:00"}
