Scan-Based Attack on Stream Ciphers: A Case Study on eSTREAM Finalists
暂无分享,去创建一个
[1] Michel Renovell,et al. Scan Design and Secure Chip , 2004, IOLTS.
[2] Debdeep Mukhopadhyay,et al. CryptoScan: A Secured Scan Chain Architecture , 2005, 14th Asian Test Symposium (ATS'05).
[3] Mark Mohammad Tehranipoor,et al. Securing Scan Design Using Lock and Key Technique , 2005, 20th IEEE International Symposium on Defect and Fault Tolerance in VLSI Systems (DFT'05).
[4] Anne Canteaut,et al. Open Problems Related to Algebraic Attacks on Stream Ciphers , 2005, WCC.
[5] Mark Mohammad Tehranipoor,et al. A low-cost solution for protecting IPs against scan-based side-channel attacks , 2006, 24th IEEE VLSI Test Symposium.
[6] Yu Liu,et al. Scan-based attacks on linear feedback shift register based stream ciphers , 2011, TODE.
[7] Don Douglas Josephson,et al. Debug methodology for the McKinley processor , 2001, Proceedings International Test Conference 2001 (Cat. No.01CH37260).
[8] Ross J. Anderson,et al. Optical Fault Induction Attacks , 2002, CHES.
[9] Bart Preneel,et al. A survey of recent developments in cryptographic algorithms for smart cards , 2007, Comput. Networks.
[10] Ramesh Karri,et al. Secure scan: a design-for-test architecture for crypto chips , 2005, Proceedings. 42nd Design Automation Conference, 2005..
[11] A. A. Kamal,et al. A Scan-Based Side Channel Attack on the NTRUEncrypt Cryptosystem , 2012, 2012 Seventh International Conference on Availability, Reliability and Security.
[12] Yaser Esmaeili Salehani,et al. SIDE CHANNEL ATTACKS ON SYMMETRIC KEY PRIMITIVES , 2011 .
[13] M. Renovell,et al. Scan design and secure chip [secure IC testing] , 2004, Proceedings. 10th IEEE International On-Line Testing Symposium.
[14] Martin Hell,et al. Grain: a stream cipher for constrained environments , 2007, Int. J. Wirel. Mob. Comput..