Author:
Agrawal Mukesh,Karmakar Sandip,Saha Dhiman,Mukhopadhyay Debdeep
Publisher
Springer Berlin Heidelberg
Reference14 articles.
1. Stallings, W.: Cryptography and Network Security: Principles and Practice. Pearson Education, London (2002)
2. Sengar, G., Mukhopadhyay, D., Chowdhury, D.R.: Secured flipped scan-chain model for crypto-architecture. IEEE Trans. on CAD of Integrated Circuits and Systems 26(11), 2080–2084 (2007)
3. Yang, B., Wu, K., Karri, R.: Secure scan: A design-for-test architecture for crypto chips. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems 25(10), 2287–2293 (2006)
4. eSTREAM, European network of excellence for cryptology (ecrypt) stream cipher project
5. Yang, B., Wu, K., Karri, R.: Scan based side channel attack on dedicated hardware implementations of data encryption standard. In: ITC 2004: Proceedings of the International Test Conference on International Test Conference, Washington, DC, USA, pp. 339–344. IEEE Computer Society, Los Alamitos (2004)
Cited by
36 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. DOSCrack: Deobfuscation Using Oracle-Guided Symbolic Execution and Clustering of Binary Security Keys;2024 IEEE International Symposium on Hardware Oriented Security and Trust (HOST);2024-05-06
2. Design-for-Testability and Its Impact on Logic Locking;Understanding Logic Locking;2023-09-23
3. Invisible Scan for Protecting Against Scan-Based Attacks: You Can't Attack What You Can't See;2023 IEEE International Test Conference India (ITC India);2023-07-23
4. On Evaluating the Security of Dynamic Scan Obfuscation Scheme;2023 IEEE 29th International Symposium on On-Line Testing and Robust System Design (IOLTS);2023-07-03
5. A High Security Encryption Circuit Based on Ring Oscillator PUF and Secure Scan Chain;2023 6th International Conference on Electronics Technology (ICET);2023-05-12