{"id":"https://openalex.org/W4414079879","doi":"https://doi.org/10.1109/tcad.2025.3607151","title":"Side-Channel Leakage in Low-Entropy Masking Schemes Attributed to FPGA Architecture","display_name":"Side-Channel Leakage in Low-Entropy Masking Schemes Attributed to FPGA Architecture","publication_year":2025,"publication_date":"2025-09-08","ids":{"openalex":"https://openalex.org/W4414079879","doi":"https://doi.org/10.1109/tcad.2025.3607151"},"language":"en","primary_location":{"id":"doi:10.1109/tcad.2025.3607151","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tcad.2025.3607151","pdf_url":null,"source":{"id":"https://openalex.org/S100835903","display_name":"IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems","issn_l":"0278-0070","issn":["0278-0070","1937-4151"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100771495","display_name":"Yanbin Li","orcid":"https://orcid.org/0000-0001-7151-9270"},"institutions":[{"id":"https://openalex.org/I154099455","display_name":"Shandong University","ror":"https://ror.org/0207yh398","country_code":"CN","type":"education","lineage":["https://openalex.org/I154099455"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yanbin Li","raw_affiliation_strings":["School of Software, Shandong University, Jinan, China"],"affiliations":[{"raw_affiliation_string":"School of Software, Shandong University, Jinan, China","institution_ids":["https://openalex.org/I154099455"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5028235090","display_name":"Yikang Guo","orcid":"https://orcid.org/0000-0002-1340-1765"},"institutions":[{"id":"https://openalex.org/I119454577","display_name":"Nanjing Agricultural University","ror":"https://ror.org/05td3s095","country_code":"CN","type":"education","lineage":["https://openalex.org/I119454577"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yikang Guo","raw_affiliation_strings":["College of Artificial Intelligence, Nanjing Agricultural University, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"College of Artificial Intelligence, Nanjing Agricultural University, Nanjing, China","institution_ids":["https://openalex.org/I119454577"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100403380","display_name":"Fan Zhang","orcid":"https://orcid.org/0000-0001-6087-8243"},"institutions":[{"id":"https://openalex.org/I168879160","display_name":"Zhejiang University of Science and Technology","ror":"https://ror.org/05mx0wr29","country_code":"CN","type":"education","lineage":["https://openalex.org/I168879160"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Fan Zhang","raw_affiliation_strings":["College of Computer Science and Technology, Zhejiang University, Hangzhou, China"],"affiliations":[{"raw_affiliation_string":"College of Computer Science and Technology, Zhejiang University, Hangzhou, China","institution_ids":["https://openalex.org/I168879160"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5100771495"],"corresponding_institution_ids":["https://openalex.org/I154099455"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.23484708,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"45","issue":"4","first_page":"2069","last_page":"2082"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11992","display_name":"CCD and CMOS Imaging Sensors","score":0.9668999910354614,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11992","display_name":"CCD and CMOS Imaging Sensors","score":0.9668999910354614,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11338","display_name":"Advancements in Photolithography Techniques","score":0.9544000029563904,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/masking","display_name":"Masking (illustration)","score":0.6682999730110168},{"id":"https://openalex.org/keywords/field-programmable-gate-array","display_name":"Field-programmable gate array","score":0.5960999727249146},{"id":"https://openalex.org/keywords/leakage","display_name":"Leakage (economics)","score":0.5687999725341797},{"id":"https://openalex.org/keywords/side-channel-attack","display_name":"Side channel attack","score":0.5670999884605408},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.5270000100135803},{"id":"https://openalex.org/keywords/entropy","display_name":"Entropy (arrow of time)","score":0.4984000027179718}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7210000157356262},{"id":"https://openalex.org/C2777402240","wikidata":"https://www.wikidata.org/wiki/Q6783436","display_name":"Masking (illustration)","level":2,"score":0.6682999730110168},{"id":"https://openalex.org/C42935608","wikidata":"https://www.wikidata.org/wiki/Q190411","display_name":"Field-programmable gate array","level":2,"score":0.5960999727249146},{"id":"https://openalex.org/C2777042071","wikidata":"https://www.wikidata.org/wiki/Q6509304","display_name":"Leakage (economics)","level":2,"score":0.5687999725341797},{"id":"https://openalex.org/C49289754","wikidata":"https://www.wikidata.org/wiki/Q2267081","display_name":"Side channel attack","level":3,"score":0.5670999884605408},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5270000100135803},{"id":"https://openalex.org/C106301342","wikidata":"https://www.wikidata.org/wiki/Q4117933","display_name":"Entropy (arrow of time)","level":2,"score":0.4984000027179718},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.48899999260902405},{"id":"https://openalex.org/C177650935","wikidata":"https://www.wikidata.org/wiki/Q1760303","display_name":"Netlist","level":2,"score":0.4449000060558319},{"id":"https://openalex.org/C113775141","wikidata":"https://www.wikidata.org/wiki/Q428691","display_name":"Computer engineering","level":1,"score":0.3828999996185303},{"id":"https://openalex.org/C200601418","wikidata":"https://www.wikidata.org/wiki/Q2193887","display_name":"Reliability engineering","level":1,"score":0.31139999628067017},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.31049999594688416},{"id":"https://openalex.org/C2779201187","wikidata":"https://www.wikidata.org/wiki/Q2775060","display_name":"Information leakage","level":2,"score":0.2888000011444092},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.2856999933719635},{"id":"https://openalex.org/C9390403","wikidata":"https://www.wikidata.org/wiki/Q3966","display_name":"Computer hardware","level":1,"score":0.27709999680519104},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.2768000066280365},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2639000117778778},{"id":"https://openalex.org/C46331935","wikidata":"https://www.wikidata.org/wiki/Q4651362","display_name":"AES implementations","level":4,"score":0.25859999656677246}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tcad.2025.3607151","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tcad.2025.3607151","pdf_url":null,"source":{"id":"https://openalex.org/S100835903","display_name":"IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems","issn_l":"0278-0070","issn":["0278-0070","1937-4151"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W4323824501","https://openalex.org/W2111241003","https://openalex.org/W2355552010","https://openalex.org/W2136687465","https://openalex.org/W3016859066","https://openalex.org/W2355315220","https://openalex.org/W4200391368","https://openalex.org/W2900215011","https://openalex.org/W2794898833","https://openalex.org/W2354319712"],"abstract_inverted_index":{"Masking":[0,20],"is":[1,109,153],"one":[2],"of":[3,11,35,66,99,126,140],"the":[4,9,12,28,33,36,64,74,79,83,88,97,100,112,118,123,145,161,176],"most":[5],"popular":[6],"to":[7,26,43,77,111,116,143,172],"guarantee":[8],"security":[10,75,89,165],"cryptographic":[13],"implementation":[14,68,84,121],"against":[15],"side-channel":[16],"analysis.":[17],"Low":[18],"Entropy":[19],"Scheme":[21],"(LEMS)":[22],"has":[23],"been":[24],"proposed":[25],"relieve":[27],"high":[29],"overhead":[30],"by":[31,136,155],"reducing":[32],"entropy":[34],"mask.":[37],"The":[38,130,151],"masks":[39],"are":[40,170],"selected":[41],"carefully":[42],"resist":[44],"univariate":[45],"first-order":[46,94,141],"attacks.":[47],"However,":[48],"in":[49,96],"practice,":[50],"securely":[51],"implementing":[52],"masking":[53,80],"can":[54,103,133],"be":[55,104,134],"a":[56,93,138],"challenging":[57],"task.":[58],"In":[59],"this":[60,107],"work,":[61],"we":[62,72,91],"exhibit":[63,92],"vulnerability":[65,152],"LEMS":[67,169],"on":[69,87,122,149],"FPGA.":[70,150],"Firstly,":[71],"provide":[73],"model":[76],"characterize":[78],"balance":[81],"at":[82],"level.":[85],"Based":[86],"model,":[90],"leakage":[95,174],"netlist":[98],"implementation.":[101],"It":[102],"proved":[105],"that":[106],"defect":[108],"due":[110],"uncontrollable":[113],"EDA":[114],"tool":[115],"optimize":[117],"AES":[119],"Sbox":[120],"specific":[124],"architecture":[125],"FPGA":[127],"during":[128,175],"synthesis.":[129],"discovered":[131],"flaw":[132],"exhibited":[135],"performing":[137],"couple":[139],"attacks":[142],"recover":[144],"secret":[146],"key":[147],"successfully":[148],"verified":[154],"simulation":[156],"and":[157,164],"practical":[158],"measurements.":[159],"Finally,":[160],"potential":[162],"countermeasure":[163],"evaluation":[166],"process":[167],"for":[168],"provided":[171],"avoid":[173],"pre-silicon":[177],"design":[178],"phase.":[179]},"counts_by_year":[],"updated_date":"2026-03-24T05:59:24.953642","created_date":"2025-10-10T00:00:00"}
