{"id":"https://openalex.org/W3200092406","doi":"https://doi.org/10.1109/tcad.2021.3112884","title":"Security Oriented Design Framework for EM Side-Channel Protection in RTL Implementations","display_name":"Security Oriented Design Framework for EM Side-Channel Protection in RTL Implementations","publication_year":2021,"publication_date":"2021-09-20","ids":{"openalex":"https://openalex.org/W3200092406","doi":"https://doi.org/10.1109/tcad.2021.3112884","mag":"3200092406"},"language":"en","primary_location":{"id":"doi:10.1109/tcad.2021.3112884","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tcad.2021.3112884","pdf_url":null,"source":{"id":"https://openalex.org/S100835903","display_name":"IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems","issn_l":"0278-0070","issn":["0278-0070","1937-4151"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5012948983","display_name":"Jiaji He","orcid":"https://orcid.org/0000-0003-1443-9279"},"institutions":[{"id":"https://openalex.org/I99065089","display_name":"Tsinghua University","ror":"https://ror.org/03cve4549","country_code":"CN","type":"education","lineage":["https://openalex.org/I99065089"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Jiaji He","raw_affiliation_strings":["School of Integrated Circuits, Tsinghua University, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Integrated Circuits, Tsinghua University, Beijing, China","institution_ids":["https://openalex.org/I99065089"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5060297615","display_name":"Haocheng Ma","orcid":"https://orcid.org/0000-0002-7118-9379"},"institutions":[{"id":"https://openalex.org/I162868743","display_name":"Tianjin University","ror":"https://ror.org/012tb2g32","country_code":"CN","type":"education","lineage":["https://openalex.org/I162868743"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Haocheng Ma","raw_affiliation_strings":["School of Microelectronics, Tianjin University, Tianjin, China"],"affiliations":[{"raw_affiliation_string":"School of Microelectronics, Tianjin University, Tianjin, China","institution_ids":["https://openalex.org/I162868743"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5051003827","display_name":"Max Panoff","orcid":"https://orcid.org/0000-0003-2849-7197"},"institutions":[{"id":"https://openalex.org/I33213144","display_name":"University of Florida","ror":"https://ror.org/02y3ad647","country_code":"US","type":"education","lineage":["https://openalex.org/I33213144"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Max Panoff","raw_affiliation_strings":["Department of Electrical and Computer Engineering, University of Florida, Gainesville, FL, USA"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, University of Florida, Gainesville, FL, USA","institution_ids":["https://openalex.org/I33213144"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5006748700","display_name":"Hanning Wang","orcid":"https://orcid.org/0000-0003-1117-2740"},"institutions":[{"id":"https://openalex.org/I99065089","display_name":"Tsinghua University","ror":"https://ror.org/03cve4549","country_code":"CN","type":"education","lineage":["https://openalex.org/I99065089"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hanning Wang","raw_affiliation_strings":["School of Integrated Circuits, Tsinghua University, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Integrated Circuits, Tsinghua University, Beijing, China","institution_ids":["https://openalex.org/I99065089"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100952126","display_name":"Yiqiang Zhao","orcid":"https://orcid.org/0000-0002-4564-952X"},"institutions":[{"id":"https://openalex.org/I162868743","display_name":"Tianjin University","ror":"https://ror.org/012tb2g32","country_code":"CN","type":"education","lineage":["https://openalex.org/I162868743"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yiqiang Zhao","raw_affiliation_strings":["School of Microelectronics, Tianjin University, Tianjin, China"],"affiliations":[{"raw_affiliation_string":"School of Microelectronics, Tianjin University, Tianjin, China","institution_ids":["https://openalex.org/I162868743"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100358856","display_name":"Leibo Liu","orcid":"https://orcid.org/0000-0001-7548-4116"},"institutions":[{"id":"https://openalex.org/I99065089","display_name":"Tsinghua University","ror":"https://ror.org/03cve4549","country_code":"CN","type":"education","lineage":["https://openalex.org/I99065089"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Leibo Liu","raw_affiliation_strings":["School of Integrated Circuits, Tsinghua University, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Integrated Circuits, Tsinghua University, Beijing, China","institution_ids":["https://openalex.org/I99065089"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5011794280","display_name":"Xiaolong Guo","orcid":"https://orcid.org/0000-0001-9896-9407"},"institutions":[{"id":"https://openalex.org/I189590672","display_name":"Kansas State University","ror":"https://ror.org/05p1j8758","country_code":"US","type":"education","lineage":["https://openalex.org/I189590672"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Xiaolong Guo","raw_affiliation_strings":["Department of Electrical and Computer Engineering, Kansas State University, Manhattan, KS, USA"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, Kansas State University, Manhattan, KS, USA","institution_ids":["https://openalex.org/I189590672"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5017464942","display_name":"Yier Jin","orcid":"https://orcid.org/0000-0002-8791-0597"},"institutions":[{"id":"https://openalex.org/I33213144","display_name":"University of Florida","ror":"https://ror.org/02y3ad647","country_code":"US","type":"education","lineage":["https://openalex.org/I33213144"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Yier Jin","raw_affiliation_strings":["Department of Electrical and Computer Engineering, University of Florida, Gainesville, FL, USA"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, University of Florida, Gainesville, FL, USA","institution_ids":["https://openalex.org/I33213144"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":8,"corresponding_author_ids":["https://openalex.org/A5012948983"],"corresponding_institution_ids":["https://openalex.org/I99065089"],"apc_list":null,"apc_paid":null,"fwci":0.9518,"has_fulltext":false,"cited_by_count":7,"citation_normalized_percentile":{"value":0.80312355,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":98},"biblio":{"volume":"41","issue":"8","first_page":"2421","last_page":"2434"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9914000034332275,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9897000193595886,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/side-channel-attack","display_name":"Side channel attack","score":0.8928833603858948},{"id":"https://openalex.org/keywords/implementation","display_name":"Implementation","score":0.6948915719985962},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6924582123756409},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.6162934899330139},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.4666799306869507},{"id":"https://openalex.org/keywords/computer-engineering","display_name":"Computer engineering","score":0.4500265419483185},{"id":"https://openalex.org/keywords/channel","display_name":"Channel (broadcasting)","score":0.4426160454750061},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.42614877223968506},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.22944363951683044},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.16258808970451355},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.15999209880828857},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.11328727006912231}],"concepts":[{"id":"https://openalex.org/C49289754","wikidata":"https://www.wikidata.org/wiki/Q2267081","display_name":"Side channel attack","level":3,"score":0.8928833603858948},{"id":"https://openalex.org/C26713055","wikidata":"https://www.wikidata.org/wiki/Q245962","display_name":"Implementation","level":2,"score":0.6948915719985962},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6924582123756409},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.6162934899330139},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.4666799306869507},{"id":"https://openalex.org/C113775141","wikidata":"https://www.wikidata.org/wiki/Q428691","display_name":"Computer engineering","level":1,"score":0.4500265419483185},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.4426160454750061},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.42614877223968506},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.22944363951683044},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.16258808970451355},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.15999209880828857},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.11328727006912231}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tcad.2021.3112884","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tcad.2021.3112884","pdf_url":null,"source":{"id":"https://openalex.org/S100835903","display_name":"IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems","issn_l":"0278-0070","issn":["0278-0070","1937-4151"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G4969156712","display_name":null,"funder_award_id":"2018ZX01027101-002","funder_id":"https://openalex.org/F4320321540","funder_display_name":"Ministry of Science and Technology of the People's Republic of China"},{"id":"https://openalex.org/G5851444845","display_name":null,"funder_award_id":"2019TQ0167","funder_id":"https://openalex.org/F4320321543","funder_display_name":"China Postdoctoral Science Foundation"},{"id":"https://openalex.org/G7358963331","display_name":null,"funder_award_id":"2018YFB2202101","funder_id":"https://openalex.org/F4320335777","funder_display_name":"National Key Research and Development Program of China"},{"id":"https://openalex.org/G777910410","display_name":null,"funder_award_id":"62004112","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320321540","display_name":"Ministry of Science and Technology of the People's Republic of China","ror":"https://ror.org/027s68j25"},{"id":"https://openalex.org/F4320321543","display_name":"China Postdoctoral Science Foundation","ror":"https://ror.org/0426zh255"},{"id":"https://openalex.org/F4320335777","display_name":"National Key Research and Development Program of China","ror":null}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":44,"referenced_works":["https://openalex.org/W59374396","https://openalex.org/W65771150","https://openalex.org/W104120367","https://openalex.org/W199979595","https://openalex.org/W1511843316","https://openalex.org/W1538105527","https://openalex.org/W1552623947","https://openalex.org/W1582924416","https://openalex.org/W1613874182","https://openalex.org/W1724890242","https://openalex.org/W1740609432","https://openalex.org/W1772067890","https://openalex.org/W1836039892","https://openalex.org/W1862426464","https://openalex.org/W1897761346","https://openalex.org/W2012930062","https://openalex.org/W2036202805","https://openalex.org/W2109431310","https://openalex.org/W2133707980","https://openalex.org/W2147082520","https://openalex.org/W2160081573","https://openalex.org/W2163432699","https://openalex.org/W2167554106","https://openalex.org/W2169761426","https://openalex.org/W2290842681","https://openalex.org/W2397058297","https://openalex.org/W2621670670","https://openalex.org/W2739579953","https://openalex.org/W2739889860","https://openalex.org/W2785011856","https://openalex.org/W2807744774","https://openalex.org/W2921829440","https://openalex.org/W2951209721","https://openalex.org/W2964145717","https://openalex.org/W2983646850","https://openalex.org/W3008761920","https://openalex.org/W3013673903","https://openalex.org/W3031247815","https://openalex.org/W3036190363","https://openalex.org/W3114803837","https://openalex.org/W4231098049","https://openalex.org/W4232592560","https://openalex.org/W6635937959","https://openalex.org/W6778580934"],"related_works":["https://openalex.org/W2922420188","https://openalex.org/W182679101","https://openalex.org/W3006344745","https://openalex.org/W2103519941","https://openalex.org/W4388857716","https://openalex.org/W3180573957","https://openalex.org/W2162805750","https://openalex.org/W2043669269","https://openalex.org/W4388856880","https://openalex.org/W2081998479"],"abstract_inverted_index":{"Electromagnetic":[0],"(EM)":[1],"side-channel":[2,36,88,117,143,153,173],"analysis":[3],"is":[4],"a":[5,85],"powerful":[6],"attack":[7],"for":[8,77,87,141,169],"extracting":[9],"secret":[10],"information":[11],"from":[12,107],"cryptographic":[13,136],"hardware":[14,109],"implementations.":[15,110],"Countermeasures":[16],"have":[17],"been":[18],"proposed":[19,194],"at":[20],"the":[21,43,68,96,112,134,150,190,193,199],"register-transfer":[22],"level":[23],"(RTL),":[24],"layout":[25],"level,":[26],"and":[27,35,72,91,179],"device":[28],"level.":[29],"However,":[30],"existing":[31],"EM":[32,123],"radiation":[33],"modeling":[34],"vulnerability":[37],"mitigation":[38],"methods":[39],"do":[40,50],"not":[41,74],"consider":[42],"structural":[44],"resilience":[45],"of":[46,133,192],"original":[47],"designs,":[48,185],"nor":[49],"they":[51],"provide":[52],"fine-grained":[53],"security":[54,89,170,200],"enhancements":[55,171],"to":[56,115,165,188],"those":[57],"vulnerable":[58,146,167],"submodules/components.":[59],"These":[60],"universal":[61],"solutions":[62],"may":[63,73],"introduce":[64],"unnecessary":[65],"overheads":[66],"on":[67,95,122,182],"circuit":[69],"under":[70],"protection":[71],"be":[75,139,156,163],"optimized":[76],"individual":[78],"designs.":[79],"In":[80,145],"this":[81,128],"article,":[82],"we":[83,119],"propose":[84],"design/synthesis":[86,159,201],"evaluation":[90,104],"optimization":[92],"framework":[93,113,195],"based":[94],"<inline-formula":[97],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[98],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">":[99],"<tex-math":[100],"notation=\"LaTeX\">${t}$":[101],"</tex-math></inline-formula>":[102],"-test":[103],"results":[105],"derived":[106],"RTL":[108,131],"While":[111],"apply":[114],"different":[116,130,183],"leakage,":[118],"focus":[120],"more":[121],"side":[124],"channels.":[125],"Supported":[126],"by":[127],"framework,":[129],"implementations":[132,181],"same":[135],"algorithm":[137],"will":[138,155,161],"evaluated":[140],"their":[142],"resistance.":[144],"implementations,":[147],"submodules":[148,168],"with":[149],"most":[151],"significant":[152],"leakages":[154],"identified.":[157],"Security":[158],"rules":[160],"then":[162],"applied":[164],"these":[166],"against":[172],"attacks":[174],"(SCAs).":[175],"Experiments,":[176],"including":[177],"simulations":[178],"FPGA":[180],"AES":[184],"are":[186],"performed":[187],"validate":[189],"effectiveness":[191],"as":[196,198],"well":[197],"rules.":[202]},"counts_by_year":[{"year":2024,"cited_by_count":5},{"year":2023,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
