An Efficient Technique to Protect AES Secret Key from Scan Test Channel Attacks
暂无分享,去创建一个
[1] Don Douglas Josephson,et al. Debug methodology for the McKinley processor , 2001, Proceedings International Test Conference 2001 (Cat. No.01CH37260).
[2] Ramesh Karri,et al. Attacks and Defenses for JTAG , 2010, IEEE Design & Test of Computers.
[3] Jennifer Seberry,et al. Systematic generation of cryptographically robust S-boxes , 1993, CCS '93.
[4] Giorgio Di Natale,et al. New security threats against chips containing scan chain structures , 2011, 2011 IEEE International Symposium on Hardware-Oriented Security and Trust.
[5] Chan-Ho Lee. Smart Bus Arbiter for QoS control in H.264 decoders , 2011 .
[6] Ramesh Karri,et al. Scan based side channel attack on dedicated hardware implementations of Data Encryption Standard , 2004 .
[7] Swarup Bhunia,et al. VIm-Scan: A Low Overhead Scan Design Approach for Protection of Secret Key in Scan-Based Secure Chips , 2007, 25th IEEE VLSI Test Symposium (VTS'07).
[8] Debdeep Mukhopadhyay,et al. Secured Flipped Scan-Chain Model for Crypto-Architecture , 2007, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems.
[9] Sandra Dominikus,et al. A Highly Regular and Scalable AES Hardware Architecture , 2003, IEEE Trans. Computers.
[10] Jaehoon Song,et al. An Efficient Secure Scan Design for an SoC Embedding AES Core , 2008, 2008 IEEE International Test Conference.
[11] Ramesh Karri,et al. Security-aware SoC test access mechanisms , 2011, 29th VLSI Test Symposium.
[12] Mark Mohammad Tehranipoor,et al. A low-cost solution for protecting IPs against scan-based side-channel attacks , 2006, 24th IEEE VLSI Test Symposium.
[13] Hideo Fujiwara,et al. Secure and testable scan design using extended de Bruijn graphs , 2010, 2010 15th Asia and South Pacific Design Automation Conference (ASP-DAC).
[14] Sungju Park,et al. Efficient Use of Unused Spare Columns for Reducing Memory Miscorrections , 2012 .
[15] Rohit Kapur. Security vs. test quality: are they mutually exclusive? , 2004 .
[16] SoYoung Kim,et al. Power Integrity and Shielding Effectiveness Modeling of Grid Structured Interconnects on PCBs , 2012 .
[17] Ramesh Karri,et al. Secure scan: a design-for-test architecture for crypto chips , 2005, Proceedings. 42nd Design Automation Conference, 2005..
[18] Mark Mohammad Tehranipoor,et al. Securing Designs against Scan-Based Side-Channel Attacks , 2007, IEEE Transactions on Dependable and Secure Computing.