Hide and Seek: Seeking the (Un)-Hidden Key in Provably-Secure Logic Locking Techniques