Securing Scan Design Using Lock & Key Technique
暂无分享,去创建一个
[1] Jürgen Gessner,et al. Design and test of an integrated cryptochip , 1991, IEEE Design & Test of Computers.
[2] Wolfgang Fichtner,et al. A 177 Mb/s VLSI implementation of the International Data Encryption Algorithm , 1994 .
[3] Paul C. Kocher,et al. Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems , 1996, CRYPTO.
[4] Mike Godwin,et al. High Noon on the Electronic Frontier: Conceptual Issues in Cyberspace , 1996 .
[5] L. R. Shade. High noon on the electronic frontier: Conceptual issues in cyberspace , 1997 .
[6] Eli Biham,et al. Differential Fault Analysis of Secret Key Cryptosystems , 1997, CRYPTO.
[7] Richard J. Lipton,et al. On the Importance of Checking Cryptographic Protocols for Faults (Extended Abstract) , 1997, EUROCRYPT.
[8] Paul C. Kocher,et al. Differential Power Analysis , 1999, CRYPTO.
[9] Bruce Schneier,et al. Side channel cryptanalysis of product ciphers , 2000 .
[10] L. Whetsel,et al. An analysis of power reduction techniques in scan testing , 2001, Proceedings International Test Conference 2001 (Cat. No.01CH37260).
[11] Nur A. Touba,et al. Reducing power dissipation during test using scan chain disable , 2001, Proceedings 19th IEEE VLSI Test Symposium. VTS 2001.
[12] Ramesh Karri,et al. Concurrent error detection schemes for fault-based side-channel cryptanalysis of symmetric block ciphers , 2002, IEEE Trans. Comput. Aided Des. Integr. Circuits Syst..
[13] Travis N. Blalock,et al. An on-chip signal suppression countermeasure to power analysis attacks , 2004, IEEE Transactions on Dependable and Secure Computing.
[14] Srivaths Ravi,et al. Tamper resistance mechanisms for secure embedded systems , 2004, 17th International Conference on VLSI Design. Proceedings..
[15] Michel Renovell,et al. Scan Design and Secure Chip , 2004, IOLTS.
[16] Ramesh Karri,et al. Scan based side channel attack on dedicated hardware implementations of Data Encryption Standard , 2004 .
[17] Srivaths Ravi,et al. Security as a new dimension in embedded system design , 2004, Proceedings. 41st Design Automation Conference, 2004..
[18] Ingrid Verbauwhede,et al. A VLSI design flow for secure side-channel attack resistant ICs , 2005, Design, Automation and Test in Europe.