{"id":"https://openalex.org/W4401642752","doi":"https://doi.org/10.3390/info15080488","title":"A Methodology to Distribute On-Chip Voltage Regulators to Improve the Security of Hardware Masking","display_name":"A Methodology to Distribute On-Chip Voltage Regulators to Improve the Security of Hardware Masking","publication_year":2024,"publication_date":"2024-08-16","ids":{"openalex":"https://openalex.org/W4401642752","doi":"https://doi.org/10.3390/info15080488"},"language":"en","primary_location":{"id":"doi:10.3390/info15080488","is_oa":true,"landing_page_url":"https://doi.org/10.3390/info15080488","pdf_url":"https://www.mdpi.com/2078-2489/15/8/488/pdf?version=1723795307","source":{"id":"https://openalex.org/S4210219776","display_name":"Information","issn_l":"2078-2489","issn":["2078-2489"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Information","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://www.mdpi.com/2078-2489/15/8/488/pdf?version=1723795307","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5084640498","display_name":"Soner Se\u00e7kiner","orcid":"https://orcid.org/0000-0002-2172-8119"},"institutions":[{"id":"https://openalex.org/I5388228","display_name":"University of Rochester","ror":"https://ror.org/022kthw22","country_code":"US","type":"education","lineage":["https://openalex.org/I5388228"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Soner Se\u00e7kiner","raw_affiliation_strings":["Department of Electrical and Computer Engineering, University of Rochester, Rochester, NY 14627, USA"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, University of Rochester, Rochester, NY 14627, USA","institution_ids":["https://openalex.org/I5388228"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5080439104","display_name":"Sel\u00e7uk K\u00f6se","orcid":"https://orcid.org/0000-0001-8095-6691"},"institutions":[{"id":"https://openalex.org/I5388228","display_name":"University of Rochester","ror":"https://ror.org/022kthw22","country_code":"US","type":"education","lineage":["https://openalex.org/I5388228"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Sel\u00e7uk K\u00f6se","raw_affiliation_strings":["Department of Electrical and Computer Engineering, University of Rochester, Rochester, NY 14627, USA"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, University of Rochester, Rochester, NY 14627, USA","institution_ids":["https://openalex.org/I5388228"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5084640498"],"corresponding_institution_ids":["https://openalex.org/I5388228"],"apc_list":{"value":1400,"currency":"CHF","value_usd":1515},"apc_paid":{"value":1400,"currency":"CHF","value_usd":1515},"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.12818273,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"15","issue":"8","first_page":"488","last_page":"488"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9984999895095825,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9882000088691711,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/masking","display_name":"Masking (illustration)","score":0.766563892364502},{"id":"https://openalex.org/keywords/chip","display_name":"Chip","score":0.5760596990585327},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5225276947021484},{"id":"https://openalex.org/keywords/computer-hardware","display_name":"Computer hardware","score":0.490882933139801},{"id":"https://openalex.org/keywords/hardware-security-module","display_name":"Hardware security module","score":0.4430628716945648},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.43329450488090515},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3279200494289398},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.19918125867843628},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.17124706506729126},{"id":"https://openalex.org/keywords/art","display_name":"Art","score":0.1019081175327301}],"concepts":[{"id":"https://openalex.org/C2777402240","wikidata":"https://www.wikidata.org/wiki/Q6783436","display_name":"Masking (illustration)","level":2,"score":0.766563892364502},{"id":"https://openalex.org/C165005293","wikidata":"https://www.wikidata.org/wiki/Q1074500","display_name":"Chip","level":2,"score":0.5760596990585327},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5225276947021484},{"id":"https://openalex.org/C9390403","wikidata":"https://www.wikidata.org/wiki/Q3966","display_name":"Computer hardware","level":1,"score":0.490882933139801},{"id":"https://openalex.org/C39217717","wikidata":"https://www.wikidata.org/wiki/Q1432354","display_name":"Hardware security module","level":3,"score":0.4430628716945648},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.43329450488090515},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3279200494289398},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.19918125867843628},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.17124706506729126},{"id":"https://openalex.org/C142362112","wikidata":"https://www.wikidata.org/wiki/Q735","display_name":"Art","level":0,"score":0.1019081175327301},{"id":"https://openalex.org/C153349607","wikidata":"https://www.wikidata.org/wiki/Q36649","display_name":"Visual arts","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.3390/info15080488","is_oa":true,"landing_page_url":"https://doi.org/10.3390/info15080488","pdf_url":"https://www.mdpi.com/2078-2489/15/8/488/pdf?version=1723795307","source":{"id":"https://openalex.org/S4210219776","display_name":"Information","issn_l":"2078-2489","issn":["2078-2489"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Information","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:3fa0885359524501a0c632bf04b2c2c9","is_oa":true,"landing_page_url":"https://doaj.org/article/3fa0885359524501a0c632bf04b2c2c9","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Information, Vol 15, Iss 8, p 488 (2024)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.3390/info15080488","is_oa":true,"landing_page_url":"https://doi.org/10.3390/info15080488","pdf_url":"https://www.mdpi.com/2078-2489/15/8/488/pdf?version=1723795307","source":{"id":"https://openalex.org/S4210219776","display_name":"Information","issn_l":"2078-2489","issn":["2078-2489"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Information","raw_type":"journal-article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/7","score":0.8600000143051147,"display_name":"Affordable and clean energy"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4401642752.pdf"},"referenced_works_count":27,"referenced_works":["https://openalex.org/W802019357","https://openalex.org/W1575133032","https://openalex.org/W1583120946","https://openalex.org/W2013124525","https://openalex.org/W2020871648","https://openalex.org/W2056144094","https://openalex.org/W2319748949","https://openalex.org/W2484552527","https://openalex.org/W2536930462","https://openalex.org/W2740246976","https://openalex.org/W2745693247","https://openalex.org/W2769167907","https://openalex.org/W2770869942","https://openalex.org/W2783032164","https://openalex.org/W2798590908","https://openalex.org/W2798781612","https://openalex.org/W2902086429","https://openalex.org/W3035863582","https://openalex.org/W3130430289","https://openalex.org/W3155668564","https://openalex.org/W3176624901","https://openalex.org/W3196116647","https://openalex.org/W3202173938","https://openalex.org/W4242566960","https://openalex.org/W4296362359","https://openalex.org/W6700410594","https://openalex.org/W6801958168"],"related_works":["https://openalex.org/W3081694532","https://openalex.org/W1969211203","https://openalex.org/W1517958729","https://openalex.org/W2092272653","https://openalex.org/W1992704972","https://openalex.org/W271627879","https://openalex.org/W2349444258","https://openalex.org/W1985388337","https://openalex.org/W4290729391","https://openalex.org/W2002555665"],"abstract_inverted_index":{"Hardware":[0],"masking":[1,18,47,67,87,119,153],"is":[2,88,273],"used":[3],"to":[4,51,59,150,168,175,190,209,221,242],"protect":[5],"against":[6],"side-channel":[7,22,57,128],"attacks":[8,58,129],"by":[9,122],"splitting":[10],"sensitive":[11],"information":[12],"into":[13],"different":[14,196],"parts,":[15],"called":[16],"hardware":[17,46,66,86,118,152],"shares.":[19],"Ideally,":[20],"a":[21,45,142,228,265,268],"attack":[23],"would":[24],"only":[25],"work":[26],"if":[27],"all":[28],"these":[29,74,250],"parts":[30],"were":[31],"completely":[32],"independent.":[33],"But":[34],"in":[35,81,178],"real-world":[36],"VLSI":[37],"implementations,":[38],"things":[39],"are":[40,162],"not":[41,78],"perfect.":[42],"Information":[43],"from":[44,64,97],"share":[48],"can":[49,130,206,257],"leak":[50],"another,":[52],"making":[53],"it":[54],"possible":[55],"for":[56,186,217],"succeed":[60],"without":[61],"needing":[62],"data":[63],"every":[65],"share.":[68],"The":[69,83,155],"theoretically":[70],"supposed":[71],"independence":[72],"of":[73,85,91,105,145,157,195],"shares":[75,120],"often":[76],"does":[77],"hold":[79],"up":[80],"practice.":[82],"effectiveness":[84],"reduced":[89],"because":[90],"the":[92,102,106,110,117,123,165,169,179,191,254],"parasitic":[93],"impedance":[94],"that":[95,233,248],"stems":[96],"power":[98,125,172,180,193,201,210],"delivery":[99,126,181],"networks":[100],"or":[101],"internal":[103],"structure":[104],"integrated":[107],"circuit.":[108],"When":[109],"coupling":[111],"effect":[112],"and":[113,237,263],"noise":[114],"spread":[115],"among":[116],"powered":[121],"same":[124],"network,":[127],"be":[131,258],"carried":[132],"out":[133],"with":[134,249,267],"fewer":[135],"measurements.":[136],"To":[137],"address":[138],"this,":[139],"we":[140],"propose":[141],"new":[143,229],"method":[144],"distributing":[146],"on-chip":[147,159],"voltage":[148,160,215,231],"regulators":[149,161,166,205],"improve":[151],"security.":[154,244],"benefits":[156],"distributed":[158,204,251],"evident.":[163],"Placing":[164],"close":[167],"load":[170],"minimizes":[171],"loss":[173],"due":[174],"resistive":[176],"losses":[177],"network.":[182],"Localized":[183],"regulation":[184],"allows":[185],"more":[187],"efficient":[188],"adjustments":[189],"varying":[192],"demands":[194],"chip":[197],"sections,":[198],"improving":[199],"overall":[200],"efficiency.":[202],"Additionally,":[203],"quickly":[207],"respond":[208],"demand":[211],"changes,":[212],"maintaining":[213],"stable":[214],"levels":[216],"high-performance":[218],"circuits,":[219],"leading":[220],"improved":[222],"control":[223],"over":[224],"noise.":[225],"We":[226],"introduce":[227],"DLDO":[230,252],"regulator":[232],"uses":[234],"random":[235],"clocking":[236],"randomizing":[238],"limit":[239],"cycle":[240],"oscillations":[241],"enhance":[243],"Our":[245],"simulations":[246],"show":[247],"regulators,":[253],"t-test":[255,269],"value":[256,270],"as":[259,261],"low":[260],"2.019,":[262],"typically,":[264],"circuit":[266],"below":[271],"4.5":[272],"considered":[274],"secure.":[275]},"counts_by_year":[],"updated_date":"2026-03-11T06:11:40.159057","created_date":"2025-10-10T00:00:00"}
