{"id":"https://openalex.org/W4400836759","doi":"https://doi.org/10.46586/tches.v2024.i3.574-602","title":"1/0 Shades of UC: Photonic Side-Channel Analysis of Universal Circuits","display_name":"1/0 Shades of UC: Photonic Side-Channel Analysis of Universal Circuits","publication_year":2024,"publication_date":"2024-07-18","ids":{"openalex":"https://openalex.org/W4400836759","doi":"https://doi.org/10.46586/tches.v2024.i3.574-602"},"language":"en","primary_location":{"id":"doi:10.46586/tches.v2024.i3.574-602","is_oa":true,"landing_page_url":"https://doi.org/10.46586/tches.v2024.i3.574-602","pdf_url":"https://tches.iacr.org/index.php/TCHES/article/download/11688/11208","source":{"id":"https://openalex.org/S4210207404","display_name":"IACR Transactions on Cryptographic Hardware and Embedded Systems","issn_l":"2569-2925","issn":["2569-2925"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IACR Transactions on Cryptographic Hardware and Embedded Systems","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://tches.iacr.org/index.php/TCHES/article/download/11688/11208","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5114221751","display_name":"Dev M. Mehta","orcid":null},"institutions":[{"id":"https://openalex.org/I107077323","display_name":"Worcester Polytechnic Institute","ror":"https://ror.org/05ejpqr48","country_code":"US","type":"education","lineage":["https://openalex.org/I107077323"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Dev M. Mehta","raw_affiliation_strings":["Worcester Polytechnic Institute, Worcester, USA"],"affiliations":[{"raw_affiliation_string":"Worcester Polytechnic Institute, Worcester, USA","institution_ids":["https://openalex.org/I107077323"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5019522026","display_name":"Mohammad Hashemi","orcid":"https://orcid.org/0000-0001-9998-6727"},"institutions":[{"id":"https://openalex.org/I107077323","display_name":"Worcester Polytechnic Institute","ror":"https://ror.org/05ejpqr48","country_code":"US","type":"education","lineage":["https://openalex.org/I107077323"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Mohammad Hashemi","raw_affiliation_strings":["Worcester Polytechnic Institute, Worcester, USA"],"affiliations":[{"raw_affiliation_string":"Worcester Polytechnic Institute, Worcester, USA","institution_ids":["https://openalex.org/I107077323"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5009243659","display_name":"Domenic Forte","orcid":"https://orcid.org/0000-0002-2794-7320"},"institutions":[{"id":"https://openalex.org/I33213144","display_name":"University of Florida","ror":"https://ror.org/02y3ad647","country_code":"US","type":"education","lineage":["https://openalex.org/I33213144"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Domenic Forte","raw_affiliation_strings":["University of Florida, Gainesville, USA"],"affiliations":[{"raw_affiliation_string":"University of Florida, Gainesville, USA","institution_ids":["https://openalex.org/I33213144"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5002624062","display_name":"Shahin Tajik","orcid":"https://orcid.org/0000-0003-3752-2358"},"institutions":[{"id":"https://openalex.org/I107077323","display_name":"Worcester Polytechnic Institute","ror":"https://ror.org/05ejpqr48","country_code":"US","type":"education","lineage":["https://openalex.org/I107077323"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Shahin Tajik","raw_affiliation_strings":["Worcester Polytechnic Institute, Worcester, USA"],"affiliations":[{"raw_affiliation_string":"Worcester Polytechnic Institute, Worcester, USA","institution_ids":["https://openalex.org/I107077323"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5017195195","display_name":"Fatemeh Ganji","orcid":"https://orcid.org/0000-0003-0151-1307"},"institutions":[{"id":"https://openalex.org/I107077323","display_name":"Worcester Polytechnic Institute","ror":"https://ror.org/05ejpqr48","country_code":"US","type":"education","lineage":["https://openalex.org/I107077323"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Fatemeh Ganji","raw_affiliation_strings":["Worcester Polytechnic Institute, Worcester, USA"],"affiliations":[{"raw_affiliation_string":"Worcester Polytechnic Institute, Worcester, USA","institution_ids":["https://openalex.org/I107077323"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5114221751"],"corresponding_institution_ids":["https://openalex.org/I107077323"],"apc_list":null,"apc_paid":null,"fwci":1.0396,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.74824461,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":95,"max":96},"biblio":{"volume":"2024","issue":"3","first_page":"574","last_page":"602"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T14117","display_name":"Integrated Circuits and Semiconductor Failure Analysis","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.978600025177002,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.745219886302948},{"id":"https://openalex.org/keywords/adversary","display_name":"Adversary","score":0.7086479067802429},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.5708948969841003},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.5609048008918762},{"id":"https://openalex.org/keywords/side-channel-attack","display_name":"Side channel attack","score":0.5468652844429016},{"id":"https://openalex.org/keywords/computer-engineering","display_name":"Computer engineering","score":0.5357263684272766},{"id":"https://openalex.org/keywords/channel","display_name":"Channel (broadcasting)","score":0.4926925301551819},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.4357045590877533},{"id":"https://openalex.org/keywords/electronic-circuit","display_name":"Electronic circuit","score":0.43538805842399597},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.36789435148239136},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.2544087767601013},{"id":"https://openalex.org/keywords/electrical-engineering","display_name":"Electrical engineering","score":0.13290944695472717},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.11842420697212219}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.745219886302948},{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.7086479067802429},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.5708948969841003},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5609048008918762},{"id":"https://openalex.org/C49289754","wikidata":"https://www.wikidata.org/wiki/Q2267081","display_name":"Side channel attack","level":3,"score":0.5468652844429016},{"id":"https://openalex.org/C113775141","wikidata":"https://www.wikidata.org/wiki/Q428691","display_name":"Computer engineering","level":1,"score":0.5357263684272766},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.4926925301551819},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.4357045590877533},{"id":"https://openalex.org/C134146338","wikidata":"https://www.wikidata.org/wiki/Q1815901","display_name":"Electronic circuit","level":2,"score":0.43538805842399597},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.36789435148239136},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.2544087767601013},{"id":"https://openalex.org/C119599485","wikidata":"https://www.wikidata.org/wiki/Q43035","display_name":"Electrical engineering","level":1,"score":0.13290944695472717},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.11842420697212219},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.46586/tches.v2024.i3.574-602","is_oa":true,"landing_page_url":"https://doi.org/10.46586/tches.v2024.i3.574-602","pdf_url":"https://tches.iacr.org/index.php/TCHES/article/download/11688/11208","source":{"id":"https://openalex.org/S4210207404","display_name":"IACR Transactions on Cryptographic Hardware and Embedded Systems","issn_l":"2569-2925","issn":["2569-2925"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IACR Transactions on Cryptographic Hardware and Embedded Systems","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:d88cf43133b74ccd950ce8aa5e32d4b9","is_oa":true,"landing_page_url":"https://doaj.org/article/d88cf43133b74ccd950ce8aa5e32d4b9","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Transactions on Cryptographic Hardware and Embedded Systems, Vol 2024, Iss 3 (2024)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.46586/tches.v2024.i3.574-602","is_oa":true,"landing_page_url":"https://doi.org/10.46586/tches.v2024.i3.574-602","pdf_url":"https://tches.iacr.org/index.php/TCHES/article/download/11688/11208","source":{"id":"https://openalex.org/S4210207404","display_name":"IACR Transactions on Cryptographic Hardware and Embedded Systems","issn_l":"2569-2925","issn":["2569-2925"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IACR Transactions on Cryptographic Hardware and Embedded Systems","raw_type":"journal-article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/17","score":0.41999998688697815,"display_name":"Partnerships for the goals"}],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":false},"content_urls":{"pdf":"https://content.openalex.org/works/W4400836759.pdf"},"referenced_works_count":65,"referenced_works":["https://openalex.org/W12537036","https://openalex.org/W84835382","https://openalex.org/W319908677","https://openalex.org/W1538012297","https://openalex.org/W1606640167","https://openalex.org/W1625255723","https://openalex.org/W1627054999","https://openalex.org/W1677409904","https://openalex.org/W1772045830","https://openalex.org/W1871911207","https://openalex.org/W1917333369","https://openalex.org/W1984267701","https://openalex.org/W2002616520","https://openalex.org/W2025818287","https://openalex.org/W2035481032","https://openalex.org/W2041812800","https://openalex.org/W2051607433","https://openalex.org/W2069185751","https://openalex.org/W2076917805","https://openalex.org/W2084682902","https://openalex.org/W2096290348","https://openalex.org/W2096434182","https://openalex.org/W2099244020","https://openalex.org/W2111276172","https://openalex.org/W2112173236","https://openalex.org/W2128017662","https://openalex.org/W2131846894","https://openalex.org/W2140904634","https://openalex.org/W2141362318","https://openalex.org/W2170696315","https://openalex.org/W2176100388","https://openalex.org/W2395279289","https://openalex.org/W2474861573","https://openalex.org/W2478604032","https://openalex.org/W2515614120","https://openalex.org/W2551658959","https://openalex.org/W2750884072","https://openalex.org/W2780755163","https://openalex.org/W2798759853","https://openalex.org/W2807803026","https://openalex.org/W2942323878","https://openalex.org/W2945206351","https://openalex.org/W2949293557","https://openalex.org/W2951822201","https://openalex.org/W2991366706","https://openalex.org/W3007030650","https://openalex.org/W3013938571","https://openalex.org/W3028857605","https://openalex.org/W3045751739","https://openalex.org/W3109471867","https://openalex.org/W3115465877","https://openalex.org/W3158373903","https://openalex.org/W3159858422","https://openalex.org/W3214880932","https://openalex.org/W4206794571","https://openalex.org/W4213073217","https://openalex.org/W4256105935","https://openalex.org/W4292471380","https://openalex.org/W4299738164","https://openalex.org/W4310370778","https://openalex.org/W4311839525","https://openalex.org/W4320721691","https://openalex.org/W4321637277","https://openalex.org/W4386858752","https://openalex.org/W4389843983"],"related_works":["https://openalex.org/W3006344745","https://openalex.org/W182679101","https://openalex.org/W2103519941","https://openalex.org/W3180573957","https://openalex.org/W2162805750","https://openalex.org/W2043669269","https://openalex.org/W1968560271","https://openalex.org/W4388856880","https://openalex.org/W2081998479","https://openalex.org/W2751059292"],"abstract_inverted_index":{"A":[0],"universal":[1],"circuit":[2,11,16],"(UC)":[3],"can":[4,13,100,133],"be":[5,101,142,168,183],"thought":[6],"of":[7,49,58,93,155,198,229],"as":[8,36,242],"a":[9,19,135,171,191,226,233],"programmable":[10],"that":[12,130,219],"simulate":[14],"any":[15],"up":[17],"to":[18,45,89,106,138,141,147,167,185],"certain":[20],"size":[21],"by":[22,103,144,189,231],"specifying":[23],"its":[24],"secret":[25,81],"configuration":[26,109,149],"bits.":[27,110,150],"UCs":[28,95,122],"have":[29,43],"been":[30],"incorporated":[31],"into":[32],"various":[33],"applications,":[34],"such":[35],"private":[37],"function":[38],"evaluation":[39],"(PFE).":[40],"Recently,":[41],"studies":[42],"attempted":[44],"formalize":[46],"the":[47,56,63,73,80,91,104,108,116,131,153,162,175,187,196],"concept":[48],"semiconductor":[50],"intellectual":[51],"property":[52],"(IP)":[53],"protection":[54],"in":[55,66,71,158,170,206],"context":[57],"UCs.":[59],"This":[60,86],"is":[61,164],"despite":[62],"observations":[64],"made":[65],"theory":[67],"and":[68,178,211],"practice":[69],"that,":[70],"reality,":[72],"adversary":[74,105,132],"may":[75],"obtain":[76],"additional":[77],"information":[78,97],"about":[79],"when":[82],"executing":[83],"cryptographic":[84],"protocols.":[85],"paper":[87],"aims":[88],"answer":[90],"question":[92],"whether":[94],"leak":[96],"unintentionally,":[98],"which":[99],"leveraged":[102],"disclose":[107],"In":[111],"this":[112],"regard,":[113],"we":[114,201,217],"propose":[115],"first":[117],"photon":[118,222],"emission":[119,223],"analysis":[120,224],"against":[121],"relying":[123],"on":[124],"computer":[125],"vision-based":[126],"approaches.":[127],"We":[128,151],"demonstrate":[129],"utilize":[134],"cost-effective":[136],"solution":[137],"take":[139],"images":[140,181,239],"processed":[143],"off-the-shelf":[145],"algorithms":[146],"extract":[148],"examine":[152],"efficacy":[154],"our":[156,199,220],"method":[157],"two":[159],"scenarios:":[160],"(1)":[161],"design":[163],"small":[165],"enough":[166],"captured":[169,184],"single":[172],"image":[173],"during":[174],"attack":[176,188],"phase,":[177],"(2)":[179],"multiple":[180],"should":[182],"launch":[186],"deploying":[190],"divide-and-conquer":[192],"strategy.":[193],"To":[194],"evaluate":[195],"effectiveness":[197],"attack,":[200],"use":[202],"metrics":[203],"commonly":[204],"applied":[205],"side-channel":[207],"analysis,":[208],"namely":[209],"rank":[210],"success":[212,227],"rate.":[213],"By":[214],"doing":[215],"so,":[216],"show":[218],"profiled":[221],"achieves":[225],"rate":[228],"1":[230],"employing":[232],"few":[234],"templates":[235],"(concretely,":[236],"only":[237],"18":[238],"were":[240],"used":[241],"templates).":[243]},"counts_by_year":[{"year":2025,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
