{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T16:42:03Z","timestamp":1773247323705,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":16,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,6,6]],"date-time":"2022-06-06T00:00:00Z","timestamp":1654473600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"NSF (National Science Foundation)","doi-asserted-by":"publisher","award":["2131156"],"award-info":[{"award-number":["2131156"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,6,6]]},"DOI":"10.1145\/3526241.3530372","type":"proceedings-article","created":{"date-parts":[[2022,6,2]],"date-time":"2022-06-02T14:37:09Z","timestamp":1654180629000},"page":"127-131","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":11,"title":["Distributed Logic Encryption: Essential Security Requirements and Low-Overhead Implementation"],"prefix":"10.1145","author":[{"given":"Raheel","family":"Afsharmazayejani","sequence":"first","affiliation":[{"name":"Independent Researcher, CARS-Lab, CSULB, Long Beach, CA, USA"}]},{"given":"Hossein","family":"Sayadi","sequence":"additional","affiliation":[{"name":"California State University Long Beach, Long Beach, CA, USA"}]},{"given":"Amin","family":"Rezaei","sequence":"additional","affiliation":[{"name":"California State University Long Beach, Long Beach, CA, USA"}]}],"member":"320","published-online":{"date-parts":[[2022,6,6]]},"reference":[{"key":"e_1_3_2_2_1_1","volume-title":"International Symposium on Hardware Oriented Security and Trust (HOST). 137--143","author":"Subramanyan P.","unstructured":"P. Subramanyan , S. Ray , and S. Malik . 2015. Evaluating the security of logic encryption algorithms . In International Symposium on Hardware Oriented Security and Trust (HOST). 137--143 . P. Subramanyan, S. Ray, and S. Malik. 2015. Evaluating the security of logic encryption algorithms. In International Symposium on Hardware Oriented Security and Trust (HOST). 137--143."},{"key":"e_1_3_2_2_2_1","volume-title":"Automation & Test in Europe Conference & Exhibition (DATE). 1069--1074","author":"Roy J. A.","unstructured":"J. A. Roy , F. Koushanfar , and I. L. Markov . 2008. Epic: Ending piracy of integrated circuits. In Design , Automation & Test in Europe Conference & Exhibition (DATE). 1069--1074 . J. A. Roy, F. Koushanfar, and I. L. Markov. 2008. Epic: Ending piracy of integrated circuits. In Design, Automation & Test in Europe Conference & Exhibition (DATE). 1069--1074."},{"key":"e_1_3_2_2_3_1","volume-title":"Automation & Test in Europe Conference & Exhibition (DATE). 953--958","author":"Rajendran J.","unstructured":"J. Rajendran , Y. Pino , O. Sinanoglu , and R. Karri . 2012. Logic encryption: A fault analysis perspective. In Design , Automation & Test in Europe Conference & Exhibition (DATE). 953--958 . J. Rajendran, Y. Pino, O. Sinanoglu, and R. Karri. 2012. Logic encryption: A fault analysis perspective. In Design, Automation & Test in Europe Conference & Exhibition (DATE). 953--958."},{"key":"e_1_3_2_2_4_1","volume-title":"Great Lakes Symposium on VLSI (GLSVLSI). 179--184","author":"Shen Y.","unstructured":"Y. Shen and H. Zhou . 2017. Double dip: Re-evaluating security of logic encryption algorithms . In Great Lakes Symposium on VLSI (GLSVLSI). 179--184 . Y. Shen and H. Zhou. 2017. Double dip: Re-evaluating security of logic encryption algorithms. In Great Lakes Symposium on VLSI (GLSVLSI). 179--184."},{"key":"e_1_3_2_2_5_1","volume-title":"International Symposium on Hardware Oriented Security and Trust (HOST). 95--100","author":"Shamsi K.","unstructured":"K. Shamsi , M. Li , T. Meade , Z. Zhao , D. Z. Pan , and Y. Jin . 2017. AppSAT: Approximately deobfuscating integrated circuits . In International Symposium on Hardware Oriented Security and Trust (HOST). 95--100 . K. Shamsi, M. Li, T. Meade, Z. Zhao, D. Z. Pan, and Y. Jin. 2017. AppSAT: Approximately deobfuscating integrated circuits. In International Symposium on Hardware Oriented Security and Trust (HOST). 95--100."},{"key":"e_1_3_2_2_6_1","volume-title":"International Symposium on Hardware Oriented Security and Trust (HOST). 236--241","author":"Yasin M.","unstructured":"M. Yasin , B. Mazumdar , J. Rajendran , and O. Sinanoglu . 2016. SARLock: SAT attack resistant logic locking . In International Symposium on Hardware Oriented Security and Trust (HOST). 236--241 . M. Yasin, B. Mazumdar, J. Rajendran, and O. Sinanoglu. 2016. SARLock: SAT attack resistant logic locking. In International Symposium on Hardware Oriented Security and Trust (HOST). 236--241."},{"key":"e_1_3_2_2_7_1","volume-title":"International Conference on Cryptographic Hardware and Embedded Systems (CHES). 127--146","author":"Xie Y.","unstructured":"Y. Xie and A. Srivastava . 2016. Mitigating SAT attack on logic locking . In International Conference on Cryptographic Hardware and Embedded Systems (CHES). 127--146 . Y. Xie and A. Srivastava. 2016. Mitigating SAT attack on logic locking. In International Conference on Cryptographic Hardware and Embedded Systems (CHES). 127--146."},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/TETC.2017.2740364"},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2020.2968183"},{"key":"e_1_3_2_2_10_1","volume-title":"Automation & Test in Europe Conference & Exhibition (DATE). 13--18","author":"Rezaei A.","unstructured":"A. Rezaei , Y. Shen , and H. Zhou . 2020. Rescuing logic encryption in post-SAT era by locking & obfuscation. In Design , Automation & Test in Europe Conference & Exhibition (DATE). 13--18 . A. Rezaei, Y. Shen, and H. Zhou. 2020. Rescuing logic encryption in post-SAT era by locking & obfuscation. In Design, Automation & Test in Europe Conference & Exhibition (DATE). 13--18."},{"key":"e_1_3_2_2_11_1","volume-title":"Automation & Test in Europe Conference & Exhibition (DATE). 1166--1171","author":"Limaye N.","unstructured":"N. Limaye , S. Patnaik , and O. Sinanoglu . 2021. Fa-SAT: Fault-aided SAT-based attack on compound logic locking techniques. In Design , Automation & Test in Europe Conference & Exhibition (DATE). 1166--1171 . N. Limaye, S. Patnaik, and O. Sinanoglu. 2021. Fa-SAT: Fault-aided SAT-based attack on compound logic locking techniques. In Design, Automation & Test in Europe Conference & Exhibition (DATE). 1166--1171."},{"key":"e_1_3_2_2_12_1","volume-title":"Automation & Test in Europe Conference & Exhibition (DATE). 940--943","author":"Shen Y.","unstructured":"Y. Shen , Y. Li , S. Kong , A. Rezaei , and H. Zhou . 2019. SigAttack: new high-level SAT-based attack on logic encryptions. In Design , Automation & Test in Europe Conference & Exhibition (DATE). 940--943 . Y. Shen, Y. Li, S. Kong, A. Rezaei, and H. Zhou. 2019. SigAttack: new high-level SAT-based attack on logic encryptions. In Design, Automation & Test in Europe Conference & Exhibition (DATE). 940--943."},{"key":"e_1_3_2_2_13_1","volume-title":"ACM SIGSAC Conference on Computer and Communications Security (CCS). 1601--1618","author":"Yasin M.","unstructured":"M. Yasin , A. Sengupta , M. T. Nabeel , M. Ashraf , J. Rajendran , and O. Sinanoglu . 2017. Provably-secure logic locking: From theory to practice . In ACM SIGSAC Conference on Computer and Communications Security (CCS). 1601--1618 . M. Yasin, A. Sengupta, M. T. Nabeel, M. Ashraf, J. Rajendran, and O. Sinanoglu. 2017. Provably-secure logic locking: From theory to practice. In ACM SIGSAC Conference on Computer and Communications Security (CCS). 1601--1618."},{"key":"e_1_3_2_2_14_1","volume-title":"IEEE International Conference on Computer Aided Design (ICCAD). 1--8.","author":"Zhou H.","unstructured":"H. Zhou , A. Rezaei , and Y. Shen . 2019. Resolving the trilemma in Logic encryption . In IEEE International Conference on Computer Aided Design (ICCAD). 1--8. H. Zhou, A. Rezaei, and Y. Shen. 2019. Resolving the trilemma in Logic encryption. In IEEE International Conference on Computer Aided Design (ICCAD). 1--8."},{"key":"e_1_3_2_2_15_1","volume-title":"IEEE International Symposium on Circuits and Systems (ISCAS). 677--692","author":"Brglez F.","unstructured":"F. Brglez and H. Fujiwara . 1985. A neutral netlist of 10 combinational benchmark circuits and a target translator in Fortran . In IEEE International Symposium on Circuits and Systems (ISCAS). 677--692 . F. Brglez and H. Fujiwara. 1985. A neutral netlist of 10 combinational benchmark circuits and a target translator in Fortran. In IEEE International Symposium on Circuits and Systems (ISCAS). 677--692."},{"key":"e_1_3_2_2_16_1","volume-title":"MCNC International Workshop on Logic Synthesis.","author":"Yang S.","year":"1991","unstructured":"S. Yang . 1991 . Logic synthesis and optimization benchmarks user guide version 3.0 . In MCNC International Workshop on Logic Synthesis. S. Yang. 1991. Logic synthesis and optimization benchmarks user guide version 3.0. In MCNC International Workshop on Logic Synthesis."}],"event":{"name":"GLSVLSI '22: Great Lakes Symposium on VLSI 2022","location":"Irvine CA USA","acronym":"GLSVLSI '22","sponsor":["SIGDA ACM Special Interest Group on Design Automation"]},"container-title":["Proceedings of the Great Lakes Symposium on VLSI 2022"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3526241.3530372","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/abs\/10.1145\/3526241.3530372","content-type":"text\/html","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3526241.3530372","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3526241.3530372","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:02:16Z","timestamp":1750186936000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3526241.3530372"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,6,6]]},"references-count":16,"alternative-id":["10.1145\/3526241.3530372","10.1145\/3526241"],"URL":"https:\/\/doi.org\/10.1145\/3526241.3530372","relation":{},"subject":[],"published":{"date-parts":[[2022,6,6]]},"assertion":[{"value":"2022-06-06","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}