Self-Test Techniques for Crypto-Devices
暂无分享,去创建一个
Giorgio Di Natale | Bruno Rouzeyre | Marie-Lise Flottes | M. Doulcier | B. Rouzeyre | G. D. Natale | M. Flottes | M. Doulcier
[1] H. Feistel. Cryptography and Computer Privacy , 1973 .
[2] Jacob Savir,et al. Built In Test for VLSI: Pseudorandom Techniques , 1987 .
[3] Sang Joon Kim,et al. A Mathematical Theory of Communication , 2006 .
[4] Nur A. Touba,et al. Circular BIST with state skipping , 2002, IEEE Trans. Very Large Scale Integr. Syst..
[5] Mark Mohammad Tehranipoor,et al. Securing Scan Design Using Lock and Key Technique , 2005, 20th IEEE International Symposium on Defect and Fault Tolerance in VLSI Systems (DFT'05).
[6] Peter Hellekalek,et al. Empirical evidence concerning AES , 2003, TOMC.
[7] Ramesh Karri,et al. Secure scan: a design-for-test architecture for crypto chips , 2005, Proceedings. 42nd Design Automation Conference, 2005..
[8] Paul H. Bardell,et al. Self-Testing of Multichip Logic Modules , 1982, International Test Conference.
[9] Bruno Rouzeyre,et al. Securing Scan Control in Crypto Chips , 2007, J. Electron. Test..
[10] Claude E. Shannon,et al. Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..
[11] Joan Daemen,et al. Cipher and hash function design strategies based on linear and differential cryptanalysis , 1995 .
[12] B. Koenemann,et al. Built-in logic block observation techniques , 1979 .
[13] Ramesh Karri,et al. Scan based side channel attack on dedicated hardware implementations of Data Encryption Standard , 2004 .
[14] Bruno Rouzeyre,et al. AES-Based BIST: Self-Test, Test Pattern Generation and Signature Analysis , 2008, 4th IEEE International Symposium on Electronic Design, Test and Applications (delta 2008).
[15] Walter Anheier,et al. On Random Pattern Testability of Cryptographic VLSI Cores , 1999, European Test Workshop 1999 (Cat. No.PR00390).
[16] Shigeo Shioda,et al. Some upper and lower bounds on the coupon collector problem , 2007 .