{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T01:42:33Z","timestamp":1740102153782,"version":"3.37.3"},"reference-count":46,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,7,3]],"date-time":"2023-07-03T00:00:00Z","timestamp":1688342400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,7,3]],"date-time":"2023-07-03T00:00:00Z","timestamp":1688342400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100002369","name":"University of Delaware Research Foundation","doi-asserted-by":"publisher","award":["21A01012"],"id":[{"id":"10.13039\/100002369","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,7,3]]},"DOI":"10.1109\/iolts59296.2023.10224859","type":"proceedings-article","created":{"date-parts":[[2023,8,28]],"date-time":"2023-08-28T17:50:13Z","timestamp":1693245013000},"page":"1-8","source":"Crossref","is-referenced-by-count":0,"title":["$\\text{MP}\\ell\\circ \\mathrm{C}$: Privacy-Preserving IP Verification Using Logic Locking and Secure Multiparty Computation"],"prefix":"10.1109","author":[{"given":"Dimitris","family":"Mouris","sequence":"first","affiliation":[{"name":"University of Delaware"}]},{"given":"Charles","family":"Gouert","sequence":"additional","affiliation":[{"name":"University of Delaware"}]},{"given":"Nektarios Georgios","family":"Tsoutsos","sequence":"additional","affiliation":[{"name":"University of Delaware"}]}],"member":"263","reference":[{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/DAC18072.2020.9218579"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1561\/3300000019"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.7873\/DATE.2015.1049"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-85174-5_32"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2021.3107251"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2015.2404876"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/DAC18072.2020.9218639"},{"key":"ref36","first-page":"1069","article-title":"EPIC: Ending piracy of integrated circuits","author":"roy","year":"2008","journal-title":"DATE"},{"key":"ref31","first-page":"162","article-title":"How to generate and exchange secrets (extended abstract)","author":"yao","year":"1986","journal-title":"27th FOCS"},{"key":"ref30","first-page":"183","article-title":"Universally ideal secret sharing schemes (preliminary version)","volume":"740","author":"beimel","year":"1993","journal-title":"CRYPTO Ser LNCS"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3484556"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-32009-5_38"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2021.3074869"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-72540-4_4"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/VTS.2012.6231062"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ISQED.2008.4479771"},{"key":"ref17","first-page":"160","article-title":"Protocols for secure computations (extended abstract)","author":"yao","year":"1982","journal-title":"23rd FOCS"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2015.2511144"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ISVLSI54635.2022.00042"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/MDT.2010.24"},{"key":"ref19","first-page":"17","author":"yasin","year":"2020","journal-title":"A Brief History of Logic Locking"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/3387108"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-38348-9_33"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978357"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-84242-0_5"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-70583-3_40"},{"key":"ref26","first-page":"287","article-title":"Fairplay - secure two-party computation system","author":"malkhi","year":"2004","journal-title":"Usenix Security 2004"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-71667-1_17"},{"journal-title":"SCALE-MAMBA","year":"2019","key":"ref20"},{"key":"ref42","first-page":"1","article-title":"ALMOST: Adversarial Learning to Mitigate Oracle-less ML Attacks via Synthesis Tuning","author":"chowdhury","year":"2023","journal-title":"57th ACM\/IEEE Design Automation Conference DAC 2023"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2022.3207361"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/MDT.2010.7"},{"key":"ref44","article-title":"Yosys - A Free Verilog Synthesis Suite","author":"wolf","year":"2013","journal-title":"20th Austrian Workshop on Microelectronics (Austrochip)"},{"key":"ref21","first-page":"151","article-title":"A neural netlist of 10 combinational benchmark circuits","author":"brglez","year":"1985","journal-title":"IEEE ISCAS Special Session on ATPG and Fault Simulation"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3417872"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-46766-1_34"},{"key":"ref27","first-page":"218","article-title":"How to play any mental game or A completeness theorem for protocols with honest majority","author":"goldreich","year":"1987","journal-title":"19th ACM STOC"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/359168.359176"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-019-09319-x"},{"journal-title":"A Fully Homomorphic Encryption Scheme","year":"2009","author":"gentry","key":"ref7"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3417893"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TEST.1999.805763"},{"key":"ref3","first-page":"170","article-title":"Your Core - My Problem? Integration and Verification of IP","author":"moretti","year":"2001","journal-title":"Proceedings of the 38th Design Automation Conference"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-00730-9_21"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2013.2263036"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/AsianHOST.2018.8607163"}],"event":{"name":"2023 IEEE 29th International Symposium on On-Line Testing and Robust System Design (IOLTS)","start":{"date-parts":[[2023,7,3]]},"location":"Crete, Greece","end":{"date-parts":[[2023,7,5]]}},"container-title":["2023 IEEE 29th International Symposium on On-Line Testing and Robust System Design (IOLTS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10224820\/10224858\/10224859.pdf?arnumber=10224859","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,18]],"date-time":"2023-09-18T17:43:19Z","timestamp":1695058999000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10224859\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,7,3]]},"references-count":46,"URL":"https:\/\/doi.org\/10.1109\/iolts59296.2023.10224859","relation":{},"subject":[],"published":{"date-parts":[[2023,7,3]]}}}