{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,17]],"date-time":"2025-12-17T10:20:37Z","timestamp":1765966837949,"version":"3.48.0"},"reference-count":33,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T00:00:00Z","timestamp":1761955200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T00:00:00Z","timestamp":1761955200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Cryptogr Eng"],"published-print":{"date-parts":[[2025,11]]},"DOI":"10.1007\/s13389-025-00386-4","type":"journal-article","created":{"date-parts":[[2025,12,5]],"date-time":"2025-12-05T13:27:29Z","timestamp":1764941249000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Netlist whisperer: extensive analysis of circuit leakage using LLMs"],"prefix":"10.1007","volume":"15","author":[{"given":"Prithwish","family":"Basu Roy","sequence":"first","affiliation":[]},{"given":"Madhav","family":"Nair","sequence":"additional","affiliation":[]},{"given":"Rajat","family":"Sadhukhan","sequence":"additional","affiliation":[]},{"given":"Manaar","family":"Alam","sequence":"additional","affiliation":[]},{"given":"Johann","family":"Knechtel","sequence":"additional","affiliation":[]},{"given":"Hammond","family":"Pearce","sequence":"additional","affiliation":[]},{"given":"Debdeep","family":"Mukhopadhyay","sequence":"additional","affiliation":[]},{"given":"Ozgur","family":"Sinanoglu","sequence":"additional","affiliation":[]},{"given":"Ramesh","family":"Karri","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,12,5]]},"reference":[{"key":"386_CR1","doi-asserted-by":"crossref","unstructured":"Balkus, S., Yan, D.: Improving short text classification with augmented data using gpt-3 (2022)","DOI":"10.1017\/S1351324923000438"},{"key":"386_CR2","doi-asserted-by":"publisher","first-page":"321","DOI":"10.1007\/978-3-319-66787-4_16","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2017","author":"S Banik","year":"2017","unstructured":"Banik, S., et al.: Gift: A small present. In: Fischer, W., Homma, N. (eds.) Cryptographic Hardware and Embedded Systems - CHES 2017, pp. 321\u2013345. Springer International Publishing, Cham (2017)"},{"key":"386_CR3","doi-asserted-by":"publisher","first-page":"313","DOI":"10.1007\/978-3-642-38348-9_19","volume-title":"Advances in Cryptology - EUROCRYPT 2013","author":"G Bertoni","year":"2013","unstructured":"Bertoni, G., Daemen, J., Peeters, M., et al.: Keccak. In: Johansson, T., Nguyen, P.Q. (eds.) Advances in Cryptology - EUROCRYPT 2013, pp. 313\u2013314. Springer, Berlin Heidelberg, Berlin, Heidelberg (2013)"},{"key":"386_CR4","volume-title":"Static Timing Analysis for Nanometer Designs: A Practical Approach","author":"J Bhasker","year":"2009","unstructured":"Bhasker, J., Chadha, R.: Static Timing Analysis for Nanometer Designs: A Practical Approach, 1st edn. Springer Publishing Company, New York, NY (2009)","edition":"1"},{"key":"386_CR5","doi-asserted-by":"publisher","first-page":"321","DOI":"10.1007\/978-3-319-78375-8_11","volume-title":"Advances in Cryptology - EUROCRYPT 2018","author":"R Bloem","year":"2018","unstructured":"Bloem, R., et al.: Formal verification of masked hardware implementations in the presence of glitches. In: Nielsen, J.B., Rijmen, V. (eds.) Advances in Cryptology - EUROCRYPT 2018, pp. 321\u2013353. Springer International Publishing, Cham (2018)"},{"key":"386_CR6","doi-asserted-by":"publisher","first-page":"450","DOI":"10.1007\/978-3-540-74735-2_31","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2007","author":"A Bogdanov","year":"2007","unstructured":"Bogdanov, A., et al.: Present: An ultra-lightweight block cipher. In: Paillier, P., Verbauwhede, I. (eds.) Cryptographic Hardware and Embedded Systems - CHES 2007, pp. 450\u2013466. Springer, Berlin Heidelberg, Berlin, Heidelberg (2007)"},{"key":"386_CR7","doi-asserted-by":"publisher","unstructured":"Budzianowski, P., Vuli\u0107, I.: Hello, it\u2019s GPT-2 - how can I help you? towards the use of pretrained language models for task-oriented dialogue systems. In: Proceedings of the 3rd Workshop on Neural Generation and Translation. Association for Computational Linguistics, Hong Kong, pp. 15\u201322, (2019) https:\/\/doi.org\/10.18653\/v1\/D19-5602, https:\/\/aclanthology.org\/D19-5602","DOI":"10.18653\/v1\/D19-5602"},{"key":"386_CR8","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4615-2325-3","volume-title":"Low Power Digital CMOS Design","author":"AP Chandrakasan","year":"1995","unstructured":"Chandrakasan, A.P., Brodersen, R.W.: Low Power Digital CMOS Design. Kluwer Academic Publishers, USA (1995)"},{"key":"386_CR9","unstructured":"Chen, M., et al.: Evaluating large language models trained on code (2021)"},{"issue":"1","key":"386_CR10","doi-asserted-by":"publisher","first-page":"113","DOI":"10.1017\/S1351324920000601","volume":"27","author":"R Dale","year":"2021","unstructured":"Dale, R.: Gpt-3: What\u2019s it good for? Nat. Lang. Eng. 27(1), 113\u2013118 (2021)","journal-title":"Nat. Lang. Eng."},{"key":"386_CR11","doi-asserted-by":"publisher","unstructured":"Devlin, J., et al.: BERT: Pre-training of deep bidirectional transformers for language understanding. In: Proceedings of the 2019 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, Volume 1 (Long and Short Papers). Association for Computational Linguistics, Minneapolis, Minnesota, pp 4171\u20134186, (2019) https:\/\/doi.org\/10.18653\/v1\/N19-1423, https:\/\/aclanthology.org\/N19-1423","DOI":"10.18653\/v1\/N19-1423"},{"key":"386_CR12","doi-asserted-by":"publisher","unstructured":"Dobraunig, C., Eichlseder, M., Mendel, F., et al.: Ascon v1.2: Lightweight authenticated encryption and hashing. Journal of Cryptology 34(3) 33 (2021) https:\/\/doi.org\/10.1007\/s00145-021-09398-9,","DOI":"10.1007\/s00145-021-09398-9"},{"issue":"2","key":"386_CR13","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2685616","volume":"24","author":"H Eldib","year":"2014","unstructured":"Eldib, H., et al.: Formal verification of software countermeasures against side-channel attacks. ACM TOSEM 24(2), 1\u201324 (2014)","journal-title":"ACM TOSEM"},{"key":"386_CR14","unstructured":"GitHub Introducing Github Copilot: your AI pair programmer. (2021) https:\/\/copilot.github.com\/"},{"key":"386_CR15","unstructured":"Goodwill, G., et al.: A testing methodology for side-channel resistance validation. https:\/\/csrc.nist.gov\/csrc\/media\/events\/non-invasive-attack-testing-workshop\/documents\/08_goodwill.pdf (2011)"},{"key":"386_CR16","doi-asserted-by":"publisher","unstructured":"Gross, H., Mangard, S., Korak, T.: Domain-oriented masking: Compact masked hardware implementations with arbitrary protection order. In: Proceedings of the 2016 ACM Workshop on Theory of Implementation Security. Association for Computing Machinery, New York, NY, USA, TIS \u201916, p. 3, (2016) https:\/\/doi.org\/10.1145\/2996366.2996426","DOI":"10.1145\/2996366.2996426"},{"key":"386_CR17","unstructured":"Gruber, M., Sigl, G.: Tofu - toggle count analysis made simple. Cryptology ePrint Archive, Paper 2022\/129, (2022) https:\/\/eprint.iacr.org\/2022\/129"},{"key":"386_CR18","doi-asserted-by":"publisher","unstructured":"He, M., Park, J., Nahiyan, A., et al.: Rtl-psc: Automated power side-channel leakage assessment at register-transfer level. In: 2019 IEEE 37th VLSI Test Symposium (VTS). Curran Associates, Inc., Red Hook, NY, pp. 1\u20136, (2019) https:\/\/doi.org\/10.1109\/VTS.2019.8758600","DOI":"10.1109\/VTS.2019.8758600"},{"key":"386_CR19","doi-asserted-by":"crossref","unstructured":"Khoury, R., Avila, AR., Brunelle, J., et al.: How secure is code generated by chatgpt? (2023)","DOI":"10.1109\/SMC53992.2023.10394237"},{"key":"386_CR20","volume-title":"Power Analysis Attacks: Revealing the Secrets of Smart Cards (Advances in Information Security)","author":"S Mangard","year":"2007","unstructured":"Mangard, S., Oswald, E., Popp, T.: Power Analysis Attacks: Revealing the Secrets of Smart Cards (Advances in Information Security). Springer-Verlag, Berlin, Heidelberg (2007)"},{"key":"386_CR21","doi-asserted-by":"publisher","first-page":"351","DOI":"10.1007\/978-3-540-30574-3_24","volume-title":"Topics in Cryptology - CT-RSA 2005","author":"S Mangard","year":"2005","unstructured":"Mangard, S., et al.: Side-channel leakage of masked cmos gates. In: Menezes, A. (ed.) Topics in Cryptology - CT-RSA 2005, pp. 351\u2013365. Springer, Berlin Heidelberg, Berlin, Heidelberg (2005)"},{"issue":"3","key":"386_CR22","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3383445","volume":"25","author":"A Nahiyan","year":"2020","unstructured":"Nahiyan, A., et al.: Script: A cad framework for power side-channel vulnerability assessment using information flow tracking and pattern generation. ACM TODAES 25(3), 1\u201327 (2020)","journal-title":"ACM TODAES"},{"key":"386_CR23","doi-asserted-by":"publisher","unstructured":"Nair, M., Sadhukhan, R., Pearce, H., et al.: Netlist whisperer: Ai and nlp fight circuit leakage! In: Proceedings of the 2023 Workshop on Attacks and Solutions in Hardware Security. Association for Computing Machinery, New York, NY, USA, ASHES \u201923, p. 83\u201392, (2023a) https:\/\/doi.org\/10.1145\/3605769.3623989,","DOI":"10.1145\/3605769.3623989"},{"key":"386_CR24","doi-asserted-by":"publisher","first-page":"320","DOI":"10.1007\/978-3-031-34671-2_23","volume-title":"Cyber Security, Cryptology, and Machine Learning","author":"M Nair","year":"2023","unstructured":"Nair, M., et al.: How hardened is your hardware? guiding chatgpt to generate secure hardware resistant to cwes. In: Dolev, S., Gudes, E., Paillier, P. (eds.) Cyber Security, Cryptology, and Machine Learning, pp. 320\u2013336. Springer Nature Switzerland, Cham (2023)"},{"key":"386_CR25","unstructured":"OpenAI Fine-tuning-open ai api. https:\/\/platform.openai.com\/docs\/guides\/fine-tuning, accessed: 2024-08-24 (2024)"},{"key":"386_CR26","doi-asserted-by":"publisher","unstructured":"Pearce, H., Tan, B., Karri, R.: Dave: Deriving automatically verilog from english. In: Proceedings of the 2020 ACM\/IEEE Workshop on Machine Learning for CAD. Association for Computing Machinery, New York, NY, USA, MLCAD \u201920, p. 27\u201332, (2020) https:\/\/doi.org\/10.1145\/3380446.3430634","DOI":"10.1145\/3380446.3430634"},{"issue":"2","key":"386_CR27","doi-asserted-by":"publisher","first-page":"436","DOI":"10.1109\/TC.2023.3333164","volume":"73","author":"R Sadhukhan","year":"2023","unstructured":"Sadhukhan, R., Saha, S., Paria, S., et al.: Valiant: An eda flow for side-channel leakage evaluation and tailored protection. IEEE Trans. Comput. 73(2), 436\u2013450 (2023). https:\/\/doi.org\/10.1109\/TC.2023.3333164","journal-title":"IEEE Trans. Comput."},{"key":"386_CR28","doi-asserted-by":"publisher","first-page":"605","DOI":"10.1007\/s10836-019-05826-8","volume":"35","author":"R Sadhukhan","year":"2019","unstructured":"Sadhukhan, R., et al.: Count your toggles: A new leakage model for pre-silicon power analysis of crypto designs. J. Electron. Test. 35, 605\u2013619 (2019)","journal-title":"J. Electron. Test."},{"key":"386_CR29","doi-asserted-by":"publisher","unstructured":"Thakur, S., et al.: Benchmarking large language models for automated verilog RTL code generation. In: Design, Automation & Test in Europe Conference & Exhibition, DATE 2023, Antwerp, Belgium, April 17-19, 2023. IEEE, pp. 1\u20136, (2023) https:\/\/doi.org\/10.23919\/DATE56975.2023.10137086","DOI":"10.23919\/DATE56975.2023.10137086"},{"issue":"3","key":"386_CR30","first-page":"1","volume":"53","author":"Y Wang","year":"2020","unstructured":"Wang, Y., et al.: Generalizing from a few examples: A survey on few-shot learning. ACM CSUR 53(3), 1\u201334 (2020)","journal-title":"ACM CSUR"},{"key":"386_CR31","volume-title":"CMOS VLSI Design: A Circuits and Systems Perspective","author":"N Weste","year":"2010","unstructured":"Weste, N., et al.: CMOS VLSI Design: A Circuits and Systems Perspective, 4th edn. Addison-Wesley Publishing Company, USA (2010)","edition":"4"},{"key":"386_CR32","doi-asserted-by":"crossref","unstructured":"White, J., et al.: Chatgpt prompt patterns for improving code quality, refactoring, requirements elicitation, and software design.(2023) https:\/\/arxiv.org\/pdf\/2303.07839.pdf","DOI":"10.1007\/978-3-031-55642-5_4"},{"key":"386_CR33","doi-asserted-by":"publisher","unstructured":"Yao, Y., Kathuria ao.: (2020) Architecture correlation analysis (aca): Identifying the source of side-channel leakage at gate-level. In: 2020 IEEE HOST. IEEE, Piscataway, NJ, pp. 188\u2013196, https:\/\/doi.org\/10.1109\/HOST45689.2020.9300271","DOI":"10.1109\/HOST45689.2020.9300271"}],"container-title":["Journal of Cryptographic Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s13389-025-00386-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s13389-025-00386-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s13389-025-00386-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,17]],"date-time":"2025-12-17T10:14:11Z","timestamp":1765966451000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s13389-025-00386-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11]]},"references-count":33,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2025,11]]}},"alternative-id":["386"],"URL":"https:\/\/doi.org\/10.1007\/s13389-025-00386-4","relation":{},"ISSN":["2190-8508","2190-8516"],"issn-type":[{"type":"print","value":"2190-8508"},{"type":"electronic","value":"2190-8516"}],"subject":[],"published":{"date-parts":[[2025,11]]},"assertion":[{"value":"31 August 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 November 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 December 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"22"}}