{"id":"https://openalex.org/W2534485457","doi":"https://doi.org/10.1109/iolts.2016.7604710","title":"Binary decision diagram to design balanced secure logic styles","display_name":"Binary decision diagram to design balanced secure logic styles","publication_year":2016,"publication_date":"2016-07-01","ids":{"openalex":"https://openalex.org/W2534485457","doi":"https://doi.org/10.1109/iolts.2016.7604710","mag":"2534485457"},"language":"en","primary_location":{"id":"doi:10.1109/iolts.2016.7604710","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iolts.2016.7604710","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2016 IEEE 22nd International Symposium on On-Line Testing and Robust System Design (IOLTS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100622516","display_name":"Hyunmin Kim","orcid":"https://orcid.org/0000-0002-5954-6417"},"institutions":[{"id":"https://openalex.org/I99464096","display_name":"KU Leuven","ror":"https://ror.org/05f950310","country_code":"BE","type":"education","lineage":["https://openalex.org/I99464096"]},{"id":"https://openalex.org/I197347611","display_name":"Korea University","ror":"https://ror.org/047dqcg40","country_code":"KR","type":"education","lineage":["https://openalex.org/I197347611"]},{"id":"https://openalex.org/I39327780","display_name":"iMinds","ror":"https://ror.org/03baec336","country_code":"BE","type":"nonprofit","lineage":["https://openalex.org/I39327780"]}],"countries":["BE","KR"],"is_corresponding":true,"raw_author_name":"Hyunmin Kim","raw_affiliation_strings":["Center for Information Security Technologies, Korea University, Seoul, South Korea","KU Leuven, ESAT/COSIC and iMinds Kasteelpark Arenberg, Heverlee, Belgium"],"affiliations":[{"raw_affiliation_string":"Center for Information Security Technologies, Korea University, Seoul, South Korea","institution_ids":["https://openalex.org/I197347611"]},{"raw_affiliation_string":"KU Leuven, ESAT/COSIC and iMinds Kasteelpark Arenberg, Heverlee, Belgium","institution_ids":["https://openalex.org/I39327780","https://openalex.org/I99464096"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5078931547","display_name":"Seokhie Hong","orcid":"https://orcid.org/0000-0001-7506-4023"},"institutions":[{"id":"https://openalex.org/I197347611","display_name":"Korea University","ror":"https://ror.org/047dqcg40","country_code":"KR","type":"education","lineage":["https://openalex.org/I197347611"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Seokhie Hong","raw_affiliation_strings":["Center for Information Security Technologies, Korea University, Seoul, South Korea"],"affiliations":[{"raw_affiliation_string":"Center for Information Security Technologies, Korea University, Seoul, South Korea","institution_ids":["https://openalex.org/I197347611"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5039506639","display_name":"Bart Preneel","orcid":"https://orcid.org/0000-0003-2005-9651"},"institutions":[{"id":"https://openalex.org/I99464096","display_name":"KU Leuven","ror":"https://ror.org/05f950310","country_code":"BE","type":"education","lineage":["https://openalex.org/I99464096"]},{"id":"https://openalex.org/I39327780","display_name":"iMinds","ror":"https://ror.org/03baec336","country_code":"BE","type":"nonprofit","lineage":["https://openalex.org/I39327780"]}],"countries":["BE"],"is_corresponding":false,"raw_author_name":"Bart Preneel","raw_affiliation_strings":["KU Leuven, ESAT/COSIC and iMinds Kasteelpark Arenberg, Heverlee, Belgium"],"affiliations":[{"raw_affiliation_string":"KU Leuven, ESAT/COSIC and iMinds Kasteelpark Arenberg, Heverlee, Belgium","institution_ids":["https://openalex.org/I39327780","https://openalex.org/I99464096"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5082347771","display_name":"Ingrid Verbauwhede","orcid":"https://orcid.org/0000-0002-0879-076X"},"institutions":[{"id":"https://openalex.org/I39327780","display_name":"iMinds","ror":"https://ror.org/03baec336","country_code":"BE","type":"nonprofit","lineage":["https://openalex.org/I39327780"]},{"id":"https://openalex.org/I99464096","display_name":"KU Leuven","ror":"https://ror.org/05f950310","country_code":"BE","type":"education","lineage":["https://openalex.org/I99464096"]}],"countries":["BE"],"is_corresponding":false,"raw_author_name":"Ingrid Verbauwhede","raw_affiliation_strings":["KU Leuven, ESAT/COSIC and iMinds Kasteelpark Arenberg, Heverlee, Belgium"],"affiliations":[{"raw_affiliation_string":"KU Leuven, ESAT/COSIC and iMinds Kasteelpark Arenberg, Heverlee, Belgium","institution_ids":["https://openalex.org/I39327780","https://openalex.org/I99464096"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5100622516"],"corresponding_institution_ids":["https://openalex.org/I197347611","https://openalex.org/I39327780","https://openalex.org/I99464096"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.06748315,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":"1666","issue":null,"first_page":"239","last_page":"244"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9934999942779541,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/binary-decision-diagram","display_name":"Binary decision diagram","score":0.7263154983520508},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.707632839679718},{"id":"https://openalex.org/keywords/side-channel-attack","display_name":"Side channel attack","score":0.6967463493347168},{"id":"https://openalex.org/keywords/power-analysis","display_name":"Power analysis","score":0.543815016746521},{"id":"https://openalex.org/keywords/influence-diagram","display_name":"Influence diagram","score":0.5349230766296387},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.5218021869659424},{"id":"https://openalex.org/keywords/logic-gate","display_name":"Logic gate","score":0.48591533303260803},{"id":"https://openalex.org/keywords/logic-family","display_name":"Logic family","score":0.45492568612098694},{"id":"https://openalex.org/keywords/logic-optimization","display_name":"Logic optimization","score":0.4403195381164551},{"id":"https://openalex.org/keywords/logic-synthesis","display_name":"Logic synthesis","score":0.41425400972366333},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.4021293520927429},{"id":"https://openalex.org/keywords/computer-engineering","display_name":"Computer engineering","score":0.39464470744132996},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.3229631185531616},{"id":"https://openalex.org/keywords/decision-tree","display_name":"Decision tree","score":0.1487787961959839},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.09656867384910583}],"concepts":[{"id":"https://openalex.org/C3309909","wikidata":"https://www.wikidata.org/wiki/Q864155","display_name":"Binary decision diagram","level":2,"score":0.7263154983520508},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.707632839679718},{"id":"https://openalex.org/C49289754","wikidata":"https://www.wikidata.org/wiki/Q2267081","display_name":"Side channel attack","level":3,"score":0.6967463493347168},{"id":"https://openalex.org/C71743495","wikidata":"https://www.wikidata.org/wiki/Q2845210","display_name":"Power analysis","level":3,"score":0.543815016746521},{"id":"https://openalex.org/C20837028","wikidata":"https://www.wikidata.org/wiki/Q623966","display_name":"Influence diagram","level":3,"score":0.5349230766296387},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5218021869659424},{"id":"https://openalex.org/C131017901","wikidata":"https://www.wikidata.org/wiki/Q170451","display_name":"Logic gate","level":2,"score":0.48591533303260803},{"id":"https://openalex.org/C162454741","wikidata":"https://www.wikidata.org/wiki/Q173359","display_name":"Logic family","level":4,"score":0.45492568612098694},{"id":"https://openalex.org/C28449271","wikidata":"https://www.wikidata.org/wiki/Q6667469","display_name":"Logic optimization","level":4,"score":0.4403195381164551},{"id":"https://openalex.org/C157922185","wikidata":"https://www.wikidata.org/wiki/Q173198","display_name":"Logic synthesis","level":3,"score":0.41425400972366333},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.4021293520927429},{"id":"https://openalex.org/C113775141","wikidata":"https://www.wikidata.org/wiki/Q428691","display_name":"Computer engineering","level":1,"score":0.39464470744132996},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.3229631185531616},{"id":"https://openalex.org/C84525736","wikidata":"https://www.wikidata.org/wiki/Q831366","display_name":"Decision tree","level":2,"score":0.1487787961959839},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.09656867384910583}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/iolts.2016.7604710","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iolts.2016.7604710","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2016 IEEE 22nd International Symposium on On-Line Testing and Robust System Design (IOLTS)","raw_type":"proceedings-article"},{"id":"pmh:oai:lirias2repo.kuleuven.be:20.500.12942/747032","is_oa":false,"landing_page_url":"https://lirias.kuleuven.be/handle/20.500.12942/747032","pdf_url":null,"source":{"id":"https://openalex.org/S4306401954","display_name":"Lirias (KU Leuven)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I99464096","host_organization_name":"KU Leuven","host_organization_lineage":["https://openalex.org/I99464096"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"acceptedVersion","is_accepted":true,"is_published":false,"raw_source_name":"IOLTS 2016, SPAIN, Catalonia, 4-6 July 2016","raw_type":"info:eu-repo/semantics/publishedVersion"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Affordable and clean energy","score":0.8700000047683716,"id":"https://metadata.un.org/sdg/7"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":14,"referenced_works":["https://openalex.org/W20217350","https://openalex.org/W1602420333","https://openalex.org/W1742462572","https://openalex.org/W1752847028","https://openalex.org/W1987134536","https://openalex.org/W2000783619","https://openalex.org/W2080267935","https://openalex.org/W2108782258","https://openalex.org/W2154909745","https://openalex.org/W2574876421","https://openalex.org/W6635937959","https://openalex.org/W6637792751","https://openalex.org/W6650429980","https://openalex.org/W6682554491"],"related_works":["https://openalex.org/W2103286150","https://openalex.org/W2089210394","https://openalex.org/W2122917767","https://openalex.org/W4300616421","https://openalex.org/W2205783098","https://openalex.org/W1596417907","https://openalex.org/W2108122578","https://openalex.org/W2163801945","https://openalex.org/W1507575448","https://openalex.org/W2768055417"],"abstract_inverted_index":{"Embedded":[0],"implementations":[1],"of":[2,27,32,36,43],"cryptographic":[3],"algorithms":[4],"require":[5],"countermeasures":[6,20],"against":[7],"side-channel":[8],"attacks":[9],"(SCAs),":[10],"that":[11,56,87],"exploit":[12],"physical":[13],"variables":[14],"measured":[15],"during":[16],"the":[17,28,44,71,96,121,132,138,152,159,166,172],"computation.":[18],"These":[19],"increase":[21],"cost,":[22],"power":[23,160],"consumption":[24,161],"and":[25,46,165],"latency":[26],"device.":[29],"One":[30],"class":[31],"countermeasures,":[33],"hiding,":[34],"consists":[35],"a":[37],"balanced":[38,139],"circuit":[39,140],"style,":[40],"including":[41],"balancing":[42],"capacitances":[45],"delays;":[47],"it":[48,99],"requires":[49],"full":[50],"connection":[51],"to":[52,82,105,120,163,171],"avoid":[53],"memory":[54],"effect":[55,59],"is":[57,118,155],"an":[58],"caused":[60],"by":[61,157,168],"repeatedly":[62],"recharged":[63],"energy":[64],"after":[65],"being":[66,93],"only":[67],"partially":[68],"discharged":[69],"at":[70,95,134],"internal":[72],"parasitic":[73],"capacitance.":[74],"This":[75],"paper":[76],"proposes":[77],"binary":[78],"decision":[79],"diagrams":[80],"(BDDs)":[81],"derive":[83],"complex":[84],"pull-down":[85],"networks":[86],"fulfill":[88],"all":[89],"these":[90],"requirements":[91],"while":[92],"compact":[94],"same":[97],"time;":[98],"uses":[100],"sense":[101],"amplifier-based":[102],"logic":[103,129,148],"(SABL)":[104],"obtain":[106],"well-balanced":[107],"pre-charge":[108],"circuits.":[109],"An":[110],"attack":[111],"based":[112],"on":[113],"mutual":[114],"information":[115,145],"analysis":[116],"(MIA)":[117],"applied":[119],"AES":[122],"S-boxes":[123],"implemented":[124],"in":[125],"our":[126],"novel":[127],"secure":[128],"style.":[130],"After":[131],"evaluation":[133],"pre-layout":[135],"SPICE":[136],"level,":[137],"with":[141],"BDD":[142],"leaks":[143],"less":[144],"than":[146],"comparable":[147],"styles,":[149],"even":[150],"though":[151],"implementation":[153],"area":[154],"reduced":[156],"40.6%,":[158],"up":[162],"46.1%":[164],"delay":[167],"35.2%":[169],"compared":[170],"classic":[173],"SABL":[174],"approach.":[175]},"counts_by_year":[{"year":2020,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
