{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,7]],"date-time":"2026-01-07T07:57:26Z","timestamp":1767772646356,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":26,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,6,30]]},"DOI":"10.1145\/3716368.3735248","type":"proceedings-article","created":{"date-parts":[[2025,6,27]],"date-time":"2025-06-27T14:00:26Z","timestamp":1751032826000},"page":"391-396","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["SAFE-SiP: Secure Authentication Framework for System-in-Package Using Multi-party Computation"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0007-6876-7653","authenticated-orcid":false,"given":"Ishraq","family":"Tashdid","sequence":"first","affiliation":[{"name":"Electrical and Computer Engineering, University of Central Florida, Orlando, Florida, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2057-7435","authenticated-orcid":false,"given":"Tasnuva","family":"Farheen","sequence":"additional","affiliation":[{"name":"Computer Science and Engineering, Louisiana State University, Baton Rouge, Louisiana, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1045-9785","authenticated-orcid":false,"given":"Sazadur","family":"Rahman","sequence":"additional","affiliation":[{"name":"Electrical and Computer Engineering, University of Central Florida, Orlando, Florida, USA"}]}],"member":"320","published-online":{"date-parts":[[2025,6,29]]},"reference":[{"key":"e_1_3_3_1_2_2","first-page":"1","volume-title":"USENIX security symposium","author":"Alkabani Yousra","year":"2007","unstructured":"Yousra Alkabani, Farinaz Koushanfar, et\u00a0al. 2007. Active Hardware Metering for Intellectual Property Protection and Security.. In USENIX security symposium, Vol.\u00a020. 1\u201320."},{"key":"e_1_3_3_1_3_2","unstructured":"N.\u00a0Nalla Anandakumar et\u00a0al. 2022. Rethinking Watermark: Providing Proof of IP Ownership in Modern SoCs. IACR Cryptol. ePrint Arch. (2022)."},{"key":"e_1_3_3_1_4_2","doi-asserted-by":"publisher","DOI":"10.1145\/100216.100287"},{"key":"e_1_3_3_1_5_2","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.39"},{"key":"e_1_3_3_1_6_2","doi-asserted-by":"publisher","DOI":"10.1145\/1455770.1455804"},{"key":"e_1_3_3_1_7_2","doi-asserted-by":"publisher","DOI":"10.1109\/ITC51656.2023.00011"},{"key":"e_1_3_3_1_8_2","doi-asserted-by":"publisher","DOI":"10.1109\/ECTC.2019.00095"},{"key":"e_1_3_3_1_9_2","first-page":"131","volume-title":"Cryptography and Security Systems","author":"al. Nicolas\u00a0T. Courtois\u00a0et","year":"2014","unstructured":"Nicolas\u00a0T. Courtois\u00a0et al.2014. Optimizing SHA256 in Bitcoin Mining. In Cryptography and Security Systems, Zbigniew Kotulski, Bogdan Ksi\u0119\u017copolski, and Katarzyna Mazur (Eds.). Springer Berlin Heidelberg, Berlin, Heidelberg, 131\u2013144."},{"key":"e_1_3_3_1_10_2","doi-asserted-by":"crossref","unstructured":"Aleksa Deric and Daniel Holcomb. 2022. Know time to die\u2013integrity checking for zero trust chiplet-based systems using between-die delay PUFs. IACR Transactions on Cryptographic Hardware and Embedded Systems (2022) 391\u2013412.","DOI":"10.46586\/tches.v2022.i3.391-412"},{"key":"e_1_3_3_1_11_2","unstructured":"Nidish\u00a0Vashistha et al.2022. ToSHI - Towards Secure Heterogeneous Integration: Security Risks Threat Assessment and Assurance. Cryptology ePrint Archive Paper 2022\/984. https:\/\/eprint.iacr.org\/2022\/984"},{"key":"e_1_3_3_1_12_2","volume-title":"Cryptography Engineering: Design Principles and Practical Applications","author":"Ferguson Niels","year":"2010","unstructured":"Niels Ferguson, Bruce Schneier, and Tadayoshi Kohno. 2010. Cryptography Engineering: Design Principles and Practical Applications. Wiley Publishing."},{"key":"e_1_3_3_1_13_2","unstructured":"Galib\u00a0Ibne Haidar\u00a0et al.[n. d.]. SECT-HI: Enabling Secure Testing for Heterogeneous Integration to Prevent SiP Counterfeits. ([n. d.])."},{"key":"e_1_3_3_1_14_2","doi-asserted-by":"publisher","DOI":"10.1145\/3649329.3656527"},{"key":"e_1_3_3_1_15_2","doi-asserted-by":"publisher","unstructured":"Carmit Hazay Peter Scholl and Eduardo Soria-Vazquez. 2020. Low Cost Constant Round MPC Combining BMR and Oblivious Transfer. Journal of Cryptology 33 4 (01 Oct 2020) 1732\u20131786. 10.1007\/s00145-020-09355-y","DOI":"10.1007\/s00145-020-09355-y"},{"key":"e_1_3_3_1_16_2","doi-asserted-by":"publisher","DOI":"10.1109\/DAC56929.2023.10247688"},{"key":"e_1_3_3_1_17_2","doi-asserted-by":"publisher","DOI":"10.1145\/2757302.2757305"},{"key":"e_1_3_3_1_18_2","doi-asserted-by":"publisher","DOI":"10.5555\/1457591"},{"key":"e_1_3_3_1_19_2","doi-asserted-by":"publisher","unstructured":"D Rachmawati J\u00a0T Tarigan and A\u00a0B\u00a0C Ginting. 2018. A comparative study of Message Digest 5(MD5) and SHA256 algorithm. Journal of Physics: Conference Series 978 1 (mar 2018) 012116. 10.1088\/1742-6596\/978\/1\/012116","DOI":"10.1088\/1742-6596\/978\/1\/012116"},{"key":"e_1_3_3_1_20_2","doi-asserted-by":"crossref","unstructured":"M\u00a0Tanjidur Rahman\u00a0et al.2020. Defense-in-depth: A recipe for logic locking to prevail. Integration 72 (2020) 39\u201357.","DOI":"10.1016\/j.vlsi.2019.12.007"},{"key":"e_1_3_3_1_21_2","first-page":"360","volume-title":"International Symposium for Testing and Failure Analysis","author":"al Sazadur Rahman\u00a0et","year":"2023","unstructured":"Sazadur Rahman\u00a0et al. 2023. Lle: Mitigating ic piracy and reverse engineering by last level edit. In International Symposium for Testing and Failure Analysis, Vol.\u00a084741. ASM International, 360\u2013369."},{"key":"e_1_3_3_1_22_2","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2019.8740831"},{"key":"e_1_3_3_1_23_2","doi-asserted-by":"publisher","DOI":"10.1109\/DAC56929.2023.10247738"},{"key":"e_1_3_3_1_24_2","doi-asserted-by":"publisher","unstructured":"Farhana Sheikh\u00a0et al.2021. 2.5D and 3D Heterogeneous Integration: Emerging applications. IEEE Solid-State Circuits Magazine 13 4 (2021) 77\u201387. 10.1109\/MSSC.2021.3111386","DOI":"10.1109\/MSSC.2021.3111386"},{"key":"e_1_3_3_1_25_2","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.32"},{"key":"e_1_3_3_1_26_2","doi-asserted-by":"publisher","DOI":"10.1109\/ECTC51529.2024.00079"},{"key":"e_1_3_3_1_27_2","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1986.25"}],"event":{"name":"GLSVLSI '25: Great Lakes Symposium on VLSI 2025","sponsor":["SIGDA ACM Special Interest Group on Design Automation"],"location":"New Orleans LA USA","acronym":"GLSVLSI '25"},"container-title":["Proceedings of the Great Lakes Symposium on VLSI 2025"],"original-title":[],"deposited":{"date-parts":[[2025,6,27]],"date-time":"2025-06-27T14:38:23Z","timestamp":1751035103000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3716368.3735248"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,6,29]]},"references-count":26,"alternative-id":["10.1145\/3716368.3735248","10.1145\/3716368"],"URL":"https:\/\/doi.org\/10.1145\/3716368.3735248","relation":{},"subject":[],"published":{"date-parts":[[2025,6,29]]},"assertion":[{"value":"2025-06-29","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}