{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,11,17]],"date-time":"2024-11-17T05:18:55Z","timestamp":1731820735050,"version":"3.28.0"},"reference-count":30,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2024,4,17]],"date-time":"2024-04-17T00:00:00Z","timestamp":1713312000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,4,17]],"date-time":"2024-04-17T00:00:00Z","timestamp":1713312000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Inf. Secur."],"published-print":{"date-parts":[[2024,6]]},"DOI":"10.1007\/s10207-024-00842-y","type":"journal-article","created":{"date-parts":[[2024,4,17]],"date-time":"2024-04-17T04:02:20Z","timestamp":1713326540000},"page":"2395-2405","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Enhancing security in QCA-based circuits using optimal key gate placement"],"prefix":"10.1007","volume":"23","author":[{"given":"M.","family":"Amutha","sequence":"first","affiliation":[]},{"given":"K. R.","family":"Kavitha","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,4,17]]},"reference":[{"issue":"1","key":"842_CR1","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1088\/0957-4484\/4\/1\/004","volume":"4","author":"CS Lent","year":"1993","unstructured":"Lent, C.S., Tougaw, P.D., Porod, W., Bernstein, G.H.: Quantum cellular automata. Nanotechnology. 4(1), 49\u201357 (1993)","journal-title":"Nanotechnology"},{"key":"842_CR2","doi-asserted-by":"crossref","unstructured":"Lent, C.S., Tougaw, P.D.: A device architecture for computing with quantum dots, Proc. IEEE, vol. 85, no. 4, pp. 541\u2013557, Apr. (1997)","DOI":"10.1109\/5.573740"},{"key":"842_CR3","doi-asserted-by":"crossref","unstructured":"Walus, K., Mazur, M., Schulhof, G., Jullien, G.A.: Simple 4-bit processor based on quantum-dot cellular automata (QCA), in Proc. 16th IEEE Int. Conf. Appl.\u2013Specific Syst., Archit. Process., Jul. pp. 288\u2013293. (2005)","DOI":"10.1109\/ASAP.2005.58"},{"key":"842_CR4","doi-asserted-by":"crossref","unstructured":"Zhang, R., Walus, K., Wang, W., Jullien, G.A.: A method of majority logic reduction for quantum cellular automata, IEEE Trans. Nanotechnol., vol. 3, no. 4, pp. 443\u2013450, Dec. (2004)","DOI":"10.1109\/TNANO.2004.834177"},{"key":"842_CR5","doi-asserted-by":"publisher","unstructured":"Liu, W., Srivastava, S., Lu, L., O\u2019Neill, M., Swartzlander, E.E.: Are QCA cryptographic circuits resistant to power analysis attack? in IEEE Transactions on Nanotechnology, vol. 11, no. 6, pp. 1239\u20131251, Nov. (2012). https:\/\/doi.org\/10.1109\/TNANO.2012.2222663","DOI":"10.1109\/TNANO.2012.2222663"},{"key":"842_CR6","doi-asserted-by":"publisher","unstructured":"Yasin, M., Rajendran, J.J., Sinanoglu, O., Karri, R.: On Improving the Security of Logic Locking, in IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, vol. 35, no. 9, pp. 1411\u20131424, Sept. (2016). https:\/\/doi.org\/10.1109\/TCAD.2015.2511144","DOI":"10.1109\/TCAD.2015.2511144"},{"key":"842_CR7","doi-asserted-by":"publisher","unstructured":"Hassan, R., Kolhe, G., Rafatirad, S., Homayoun, H., Dinakarrao, S.M.P.: A Neural Network-Based Cognitive Obfuscation Toward Enhanced Logic Locking, in IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, vol. 41, no. 11, pp. 4587\u20134599, Nov. (2022). https:\/\/doi.org\/10.1109\/TCAD.2021.3138686","DOI":"10.1109\/TCAD.2021.3138686"},{"key":"842_CR8","doi-asserted-by":"publisher","unstructured":"Leonhard, J., et al.: Aug., Digitally Assisted Mixed-Signal Circuit Security, in IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, vol. 41, no. 8, pp. 2449\u20132462, (2022). https:\/\/doi.org\/10.1109\/TCAD.2021.3111550","DOI":"10.1109\/TCAD.2021.3111550"},{"key":"842_CR9","doi-asserted-by":"publisher","unstructured":"Zuzak, M., Mondal, A., Srivastava, A.: Evaluating the Security of Logic-Locked Probabilistic Circuits, in IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, vol. 41, no. 7, pp. 2004\u20132009, July (2022). https:\/\/doi.org\/10.1109\/TCAD.2021.3104270","DOI":"10.1109\/TCAD.2021.3104270"},{"key":"842_CR10","doi-asserted-by":"publisher","unstructured":"Yang, X.-M., Chen, P.-P., Chiang, H.-Y., Lin, C.-C., Chen, Y.-C., Wang, C.-Y.: LOOPLock 2.0: An Enhanced Cyclic Logic Locking Approach, in IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, vol. 41, no. 1, pp. 29\u201334, Jan. (2022). https:\/\/doi.org\/10.1109\/TCAD.2021.3053912","DOI":"10.1109\/TCAD.2021.3053912"},{"key":"842_CR11","doi-asserted-by":"publisher","unstructured":"A.Alaql, M.M., Rahman, Bhunia, S.: SCOPE: Synthesis-Based Constant Propagation Attack on Logic Locking, in IEEE Transactions on Very Large Scale Integration (VLSI) Systems, vol. 29, no. 8, pp. 1529\u20131542, Aug. (2021). https:\/\/doi.org\/10.1109\/TVLSI.2021.3089555","DOI":"10.1109\/TVLSI.2021.3089555"},{"key":"842_CR12","doi-asserted-by":"publisher","first-page":"3724","DOI":"10.1109\/TIFS.2021.3092135","volume":"16","author":"Alaql","year":"2021","unstructured":"Alaql, Bhunia, S.: SARO: Scalable attack-resistant logic locking. IEEE Trans. Inf. Forensics Secur. 16, 3724\u20133739 (2021). https:\/\/doi.org\/10.1109\/TIFS.2021.3092135","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"842_CR13","doi-asserted-by":"publisher","unstructured":"Jabbari, T., Krylov, G., Friedman, E.G.: Logic Locking in Single Flux Quantum Circuits, in IEEE Transactions on Applied Superconductivity, vol. 31, no. 5, pp. 1\u20135, Aug. Art no. 1301605, (2021). https:\/\/doi.org\/10.1109\/TASC.2021.3065301","DOI":"10.1109\/TASC.2021.3065301"},{"key":"842_CR14","doi-asserted-by":"publisher","unstructured":"Rathor, V.S., Sharma, G.K.: A Lightweight Robust Logic Locking Technique to Thwart Sensitization and Cone-Based Attacks, in IEEE Transactions on Emerging Topics in Computing, vol. 9, no. 2, pp. 811\u2013822, 1 April-June (2021). https:\/\/doi.org\/10.1109\/TETC.2019.2935250","DOI":"10.1109\/TETC.2019.2935250"},{"key":"842_CR15","doi-asserted-by":"publisher","unstructured":"Sengupta, A., Mazumdar, B., Yasin, M., Sinanoglu, O.: Logic Locking With Provable Security Against Power Analysis Attacks, in IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, vol. 39, no. 4, pp. 766\u2013778, April (2020). https:\/\/doi.org\/10.1109\/TCAD.2019.2897699","DOI":"10.1109\/TCAD.2019.2897699"},{"key":"842_CR16","doi-asserted-by":"publisher","unstructured":"Yang, F., Tang, M., Sinanoglu, O.: Stripped Functionality Logic Locking With Hamming Distance-Based Restore Unit (SFLL-hd) \u2013 Unlocked, in IEEE Transactions on Information Forensics and Security, vol. 14, no. 10, pp. 2778\u20132786, Oct. (2019). https:\/\/doi.org\/10.1109\/TIFS.2019.2904838","DOI":"10.1109\/TIFS.2019.2904838"},{"key":"842_CR17","doi-asserted-by":"publisher","unstructured":"Xie, Y., Srivastava, A.: Anti-SAT: Mitigating SAT Attack on Logic Locking, in IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, vol. 38, no. 2, pp. 199\u2013207, Feb. (2019). https:\/\/doi.org\/10.1109\/TCAD.2018.2801220","DOI":"10.1109\/TCAD.2018.2801220"},{"key":"842_CR18","doi-asserted-by":"publisher","unstructured":"Rathor, V.S., Singh, M., Sahoo, K.S., Mohanty, S.P.: GateLock: Input-Dependent Key-based locked Gates for SAT resistant logic locking, in IEEE transactions on very large scale integration (VLSI) systems, https:\/\/doi.org\/10.1109\/TVLSI.2023.3340350","DOI":"10.1109\/TVLSI.2023.3340350"},{"key":"842_CR19","doi-asserted-by":"publisher","unstructured":"Vega, P.S.L.P.S.K., Bhunia, S.: IOLock: An Input\/Output locking Scheme for Protection against Reverse Engineering attacks. in IEEE Trans. Very Large Scale Integr. VLSI Syst., https:\/\/doi.org\/10.1109\/TVLSI.2023.3337310","DOI":"10.1109\/TVLSI.2023.3337310"},{"key":"842_CR20","doi-asserted-by":"publisher","unstructured":"Hu, Y., Zhang, Y., Yang, K., Chen, D., Beerel, P.A., Nuzzo, P.: On the Security of Sequential Logic Locking Against Oracle-Guided Attacks, in IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, vol. 42, no. 11, pp. 3628\u20133641, Nov. (2023). https:\/\/doi.org\/10.1109\/TCAD.2023.3253428","DOI":"10.1109\/TCAD.2023.3253428"},{"key":"842_CR21","unstructured":"Rahimi, E., Nejad, S.M.: Secure Clocked QCA logic for implementation of Quantum Cryptographic Processors, 2009 Applied Electronics, Pilsen, Czech Republic, pp. 217\u2013220. (2009)"},{"key":"842_CR22","doi-asserted-by":"publisher","unstructured":"Das, J.C., De, D.: Quantum Dot-Cellular Automata based cipher text design for nano-communication, 2012 International Conference on Radar, Communication and Computing (ICRCC), Tiruvannamalai, India, pp. 224\u2013229, (2012). https:\/\/doi.org\/10.1109\/ICRCC.2012.6450583","DOI":"10.1109\/ICRCC.2012.6450583"},{"key":"842_CR23","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-10766-5_15","volume-title":"Computational Intelligence in Communications and Business Analytics. CICBA 2022","author":"S Tapna","year":"2022","unstructured":"Tapna, S., Chakrabarti, K., Mukhopadhyay, D.: A Secure Communication Gateway with parity generator implementation in QCA platform. In: Mukhopadhyay, S., Sarkar, S., Dutta, P., Mandal, J.K., Roy, S. (eds.) Computational Intelligence in Communications and Business Analytics. CICBA 2022. Communications in Computer and Information Science, vol. 1579. Springer, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-031-10766-5_15"},{"key":"842_CR24","doi-asserted-by":"publisher","first-page":"194","DOI":"10.1007\/s11107-021-00952-w","volume":"42","author":"B Debnath","year":"2021","unstructured":"Debnath, B., Das, J.C., De, D.: SQCA: Symmetric key-based Crypto-Codec for secure nano-communication using QCA. Photon Netw. Commun. 42, 194\u2013208 (2021). https:\/\/doi.org\/10.1007\/s11107-021-00952-w","journal-title":"Photon Netw. Commun."},{"key":"842_CR25","first-page":"ISSN0141","volume":"104240","author":"-S Samaneh","year":"2021","unstructured":"Samaneh, -S., Hashemipour, K., Navi, R., Sabbaghi-Nadooshan: A robust encrypted nanocommunication in QCA Circuit. Microprocess. Microsyst. 104240, ISSN0141\u20139331 (2021)","journal-title":"Microprocess. Microsyst."},{"key":"842_CR26","doi-asserted-by":"crossref","unstructured":"Jianhong Huang, G., Xie, R., Kuang, F., Deng: Yongqiang Zhang,QCA-based Hamming code circuit for nano communication network,microprocessors and Microsystems,84,2021,104237.","DOI":"10.1016\/j.micpro.2021.104237"},{"key":"842_CR27","volume-title":"Smart Intelligent Computing and Applications","author":"P Anuradha","year":"2022","unstructured":"Anuradha, P., Rajkumar, K., Arabelli, R.R., Shareena, R.: QCA-Based Error Detection Circuit for Nanocommunication Network. In: Bhateja, V., Satapathy, S.C., Travieso-Gonzalez, C.M., Adilakshmi, T. (eds.) Smart Intelligent Computing and Applications. Smart Innovation, Systems and Technologies, vol. 1. vol 282. Springer, Singapore (2022)"},{"key":"842_CR28","doi-asserted-by":"crossref","unstructured":"Shu, X., Li, L., Ren, M., Mohammed, B., Omar: A new binary to gray code converter based on quantum-dot cellular automata nanotechnology. Photon Netw. Commun., (), \u2013. (2020)","DOI":"10.1007\/s11107-020-00915-7"},{"key":"842_CR29","doi-asserted-by":"publisher","unstructured":"Sadeeq, H.T., Abdulazeez, A.M.: Giant Trevally Optimizer (GTO): A Novel Metaheuristic Algorithm for Global Optimization and Challenging Engineering Problems, in IEEE Access, vol. 10, pp. 121615\u2013121640, (2022). https:\/\/doi.org\/10.1109\/ACCESS.2022.3223388","DOI":"10.1109\/ACCESS.2022.3223388"},{"key":"842_CR30","doi-asserted-by":"publisher","first-page":"162","DOI":"10.1007\/s10825-016-0938-7","volume":"16","author":"AA Sarvaghad-Moghaddam, Moein","year":"2017","unstructured":"Sarvaghad-Moghaddam, Moein, A.A., Orouji, Houshmand, M.: A multi-objective synthesis methodology for majority\/minority logic networks. J. Comput. Electron. 16, 162\u2013179 (2017)","journal-title":"J. Comput. Electron."}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-024-00842-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10207-024-00842-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-024-00842-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,16]],"date-time":"2024-11-16T11:19:52Z","timestamp":1731755992000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10207-024-00842-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,4,17]]},"references-count":30,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2024,6]]}},"alternative-id":["842"],"URL":"https:\/\/doi.org\/10.1007\/s10207-024-00842-y","relation":{},"ISSN":["1615-5262","1615-5270"],"issn-type":[{"type":"print","value":"1615-5262"},{"type":"electronic","value":"1615-5270"}],"subject":[],"published":{"date-parts":[[2024,4,17]]},"assertion":[{"value":"17 April 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"No participation of humans takes place in this implementation process.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval and consent to participate"}},{"value":"The authors declare no competing interests.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}},{"value":"Human and Animal Rights:","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}},{"value":"No violation of Human and Animal Rights is involved.","order":5,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}},{"value":"Conflict of Interest is not applicable in this work.","order":6,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}