{"id":"https://openalex.org/W2066834245","doi":"https://doi.org/10.1145/2810103.2813723","title":"Lattice Basis Reduction Attack against Physically Unclonable Functions","display_name":"Lattice Basis Reduction Attack against Physically Unclonable Functions","publication_year":2015,"publication_date":"2015-10-06","ids":{"openalex":"https://openalex.org/W2066834245","doi":"https://doi.org/10.1145/2810103.2813723","mag":"2066834245"},"language":"en","primary_location":{"id":"doi:10.1145/2810103.2813723","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2810103.2813723","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5017195195","display_name":"Fatemeh Ganji","orcid":"https://orcid.org/0000-0003-0151-1307"},"institutions":[{"id":"https://openalex.org/I4577782","display_name":"Technische Universit\u00e4t Berlin","ror":"https://ror.org/03v4gjf40","country_code":"DE","type":"education","lineage":["https://openalex.org/I4577782"]}],"countries":["DE"],"is_corresponding":true,"raw_author_name":"Fatemeh Ganji","raw_affiliation_strings":["TU Berlin/ SecT, Berlin, Germany"],"affiliations":[{"raw_affiliation_string":"TU Berlin/ SecT, Berlin, Germany","institution_ids":["https://openalex.org/I4577782"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5061353492","display_name":"Juliane Kr\u00e4mer","orcid":"https://orcid.org/0000-0002-3599-4215"},"institutions":[{"id":"https://openalex.org/I31512782","display_name":"Technical University of Darmstadt","ror":"https://ror.org/05n911h24","country_code":"DE","type":"education","lineage":["https://openalex.org/I31512782"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Juliane Kr\u00e4mer","raw_affiliation_strings":["TU Darmstadt/ CDC, Darmstadt, Germany","TU Darmstadt/ CDC, Darmstadt, Germany#TAB#"],"affiliations":[{"raw_affiliation_string":"TU Darmstadt/ CDC, Darmstadt, Germany","institution_ids":["https://openalex.org/I31512782"]},{"raw_affiliation_string":"TU Darmstadt/ CDC, Darmstadt, Germany#TAB#","institution_ids":["https://openalex.org/I31512782"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5001159554","display_name":"Jean\u2010Pierre Seifert","orcid":"https://orcid.org/0000-0002-5372-4825"},"institutions":[{"id":"https://openalex.org/I4577782","display_name":"Technische Universit\u00e4t Berlin","ror":"https://ror.org/03v4gjf40","country_code":"DE","type":"education","lineage":["https://openalex.org/I4577782"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Jean-Pierre Seifert","raw_affiliation_strings":["TU Berlin/ SecT, Berlin, Germany"],"affiliations":[{"raw_affiliation_string":"TU Berlin/ SecT, Berlin, Germany","institution_ids":["https://openalex.org/I4577782"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5002624062","display_name":"Shahin Tajik","orcid":"https://orcid.org/0000-0003-3752-2358"},"institutions":[{"id":"https://openalex.org/I4577782","display_name":"Technische Universit\u00e4t Berlin","ror":"https://ror.org/03v4gjf40","country_code":"DE","type":"education","lineage":["https://openalex.org/I4577782"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Shahin Tajik","raw_affiliation_strings":["TU Berlin/ SecT, Berlin, Germany"],"affiliations":[{"raw_affiliation_string":"TU Berlin/ SecT, Berlin, Germany","institution_ids":["https://openalex.org/I4577782"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5017195195"],"corresponding_institution_ids":["https://openalex.org/I4577782"],"apc_list":null,"apc_paid":null,"fwci":5.1677,"has_fulltext":false,"cited_by_count":25,"citation_normalized_percentile":{"value":0.9575561,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"1070","last_page":"1080"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T14117","display_name":"Integrated Circuits and Semiconductor Failure Analysis","score":0.9869999885559082,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12859","display_name":"Cell Image Analysis Techniques","score":0.978600025177002,"subfield":{"id":"https://openalex.org/subfields/1304","display_name":"Biophysics"},"field":{"id":"https://openalex.org/fields/13","display_name":"Biochemistry, Genetics and Molecular Biology"},"domain":{"id":"https://openalex.org/domains/1","display_name":"Life Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/arbiter","display_name":"Arbiter","score":0.9955039620399475},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6909516453742981},{"id":"https://openalex.org/keywords/lattice-reduction","display_name":"Lattice reduction","score":0.5101271271705627},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.5065275430679321},{"id":"https://openalex.org/keywords/side-channel-attack","display_name":"Side channel attack","score":0.49240386486053467},{"id":"https://openalex.org/keywords/basis","display_name":"Basis (linear algebra)","score":0.48592081665992737},{"id":"https://openalex.org/keywords/countermeasure","display_name":"Countermeasure","score":0.4843672215938568},{"id":"https://openalex.org/keywords/reduction","display_name":"Reduction (mathematics)","score":0.45850473642349243},{"id":"https://openalex.org/keywords/channel","display_name":"Channel (broadcasting)","score":0.4025840759277344},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3532347083091736},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.3380500376224518},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.2410452663898468},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.22429180145263672},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.1684257686138153},{"id":"https://openalex.org/keywords/mimo","display_name":"MIMO","score":0.09739789366722107}],"concepts":[{"id":"https://openalex.org/C2779971761","wikidata":"https://www.wikidata.org/wiki/Q629872","display_name":"Arbiter","level":2,"score":0.9955039620399475},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6909516453742981},{"id":"https://openalex.org/C44274781","wikidata":"https://www.wikidata.org/wiki/Q6497132","display_name":"Lattice reduction","level":4,"score":0.5101271271705627},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5065275430679321},{"id":"https://openalex.org/C49289754","wikidata":"https://www.wikidata.org/wiki/Q2267081","display_name":"Side channel attack","level":3,"score":0.49240386486053467},{"id":"https://openalex.org/C12426560","wikidata":"https://www.wikidata.org/wiki/Q189569","display_name":"Basis (linear algebra)","level":2,"score":0.48592081665992737},{"id":"https://openalex.org/C21593369","wikidata":"https://www.wikidata.org/wiki/Q1032176","display_name":"Countermeasure","level":2,"score":0.4843672215938568},{"id":"https://openalex.org/C111335779","wikidata":"https://www.wikidata.org/wiki/Q3454686","display_name":"Reduction (mathematics)","level":2,"score":0.45850473642349243},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.4025840759277344},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3532347083091736},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3380500376224518},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.2410452663898468},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.22429180145263672},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.1684257686138153},{"id":"https://openalex.org/C207987634","wikidata":"https://www.wikidata.org/wiki/Q176862","display_name":"MIMO","level":3,"score":0.09739789366722107},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C146978453","wikidata":"https://www.wikidata.org/wiki/Q3798668","display_name":"Aerospace engineering","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/2810103.2813723","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2810103.2813723","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.41999998688697815}],"awards":[],"funders":[{"id":"https://openalex.org/F4320321114","display_name":"Bundesministerium f\u00fcr Bildung und Forschung","ror":"https://ror.org/04pz7b180"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":42,"referenced_works":["https://openalex.org/W22334361","https://openalex.org/W80562455","https://openalex.org/W94652904","https://openalex.org/W124944822","https://openalex.org/W338742241","https://openalex.org/W610273277","https://openalex.org/W1527013905","https://openalex.org/W1557027117","https://openalex.org/W1563937974","https://openalex.org/W1751761265","https://openalex.org/W1917333369","https://openalex.org/W1968182591","https://openalex.org/W1976677460","https://openalex.org/W1989510734","https://openalex.org/W2000171858","https://openalex.org/W2006550815","https://openalex.org/W2016244202","https://openalex.org/W2044389004","https://openalex.org/W2076611807","https://openalex.org/W2076917805","https://openalex.org/W2080284304","https://openalex.org/W2107347355","https://openalex.org/W2115255494","https://openalex.org/W2116374153","https://openalex.org/W2141757723","https://openalex.org/W2151759197","https://openalex.org/W2153885989","https://openalex.org/W2169212403","https://openalex.org/W2172255798","https://openalex.org/W2188484915","https://openalex.org/W2265382507","https://openalex.org/W2289458927","https://openalex.org/W2397588769","https://openalex.org/W2399877787","https://openalex.org/W2483049553","https://openalex.org/W3194506215","https://openalex.org/W4206558398","https://openalex.org/W6603899985","https://openalex.org/W6677234901","https://openalex.org/W6680495628","https://openalex.org/W6684566051","https://openalex.org/W6685532747"],"related_works":["https://openalex.org/W2121017442","https://openalex.org/W2248741777","https://openalex.org/W1790664656","https://openalex.org/W182679101","https://openalex.org/W3006344745","https://openalex.org/W2103519941","https://openalex.org/W3180573957","https://openalex.org/W2162805750","https://openalex.org/W2043669269","https://openalex.org/W4388856880"],"abstract_inverted_index":{"Due":[0],"to":[1,44,94,175],"successful":[2],"modeling":[3,47,80],"attacks":[4,48],"against":[5,79,153],"arbiter":[6,17,39,60,68,111,155,164],"PUFs":[7,18,61,156],"(Physically":[8],"Unclonable":[9],"Functions),":[10],"the":[11,56,84,107,113,189],"trend":[12],"towards":[13],"consideration":[14],"of":[15,37,58,66,86,106,109,131,162,192],"XOR":[16,59,110,154],"has":[19,23,70,98],"emerged.":[20],"Nevertheless,":[21],"it":[22],"already":[24],"been":[25,72,100],"demonstrated":[26],"that":[27],"even":[28],"this":[29],"new":[30,147],"non-linear":[31],"structure,":[32],"with":[33,62,90,157],"a":[34,63,91,103,124,129,132,138],"restricted":[35],"number":[36,65,161],"parallel":[38,67,163],"chains,":[40],"is":[41,128,196],"still":[42],"vulnerable":[43],"more":[45],"advanced":[46],"and":[49,81,96,137],"side":[50,140],"channel":[51,141],"analyses.":[52],"However,":[53],"so":[54],"far":[55],"security":[57,108],"large":[64,160],"chains":[69],"not":[71,171],"appropriately":[73],"assessed.":[74],"Furthermore,":[75],"as":[76,198],"another":[77],"countermeasure":[78],"physical":[82],"attacks,":[83],"concept":[85],"controlled":[87],"PUFs,":[88,112],"i.e.,":[89],"limited":[92],"access":[93,174],"challenges":[95,176],"responses,":[97],"also":[99],"developed.":[101],"Towards":[102],"better":[104],"understanding":[105],"present":[114,144],"paper":[115],"simultaneously":[116],"addresses":[117],"all":[118],"above":[119],"mentioned":[120],"countermeasures":[121],"by":[122,180],"introducing":[123],"novel":[125],"attack,":[126],"which":[127],"combination":[130],"lattice":[133],"basis":[134],"reduction":[135],"attack":[136,148,169,194],"photonic":[139],"analysis.":[142],"We":[143],"how":[145],"our":[146,168,186,193],"can":[149],"be":[150],"successfully":[151],"launched":[152],"an":[158,182],"arbitrarily":[159],"chains.":[165],"Most":[166],"interestingly,":[167],"does":[170],"require":[172],"any":[173],"or":[177],"responses.":[178],"Finally,":[179],"conducting":[181],"exhaustive":[183],"discussion":[184],"on":[185],"experimental":[187],"results,":[188],"practical":[190],"feasibility":[191],"scenario":[195],"proved":[197],"well.":[199]},"counts_by_year":[{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":2},{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":5},{"year":2017,"cited_by_count":4},{"year":2016,"cited_by_count":6},{"year":2015,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
