Cryptography and Network Security: Principles and Practice
Cryptography and Network Security: Principles and Practice
IOLTS '04 Proceedings of the International On-Line Testing Symposium, 10th IEEE
Test Control for Secure Scan Designs
ETS '05 Proceedings of the 10th IEEE European Symposium on Test
Securing Scan Design Using Lock and Key Technique
DFT '05 Proceedings of the 20th IEEE International Symposium on Defect and Fault Tolerance in VLSI Systems
CryptoScan: A Secured Scan Chain Architecture
ATS '05 Proceedings of the 14th Asian Test Symposium on Asian Test Symposium
Scan Based Side Channel Attack on Dedicated Hardware Implementations of Data Encryption Standard
ITC '04 Proceedings of the International Test Conference on International Test Conference
A secure scan design methodology
Proceedings of the conference on Design, automation and test in Europe: Proceedings
Secure Scan Techniques: A Comparison
IOLTS '06 Proceedings of the 12th IEEE International Symposium on On-Line Testing
Secure Scan: A Design-for-Test Architecture for Crypto Chips
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems
Secured Flipped Scan-Chain Model for Crypto-Architecture
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems
Fault analysis of grain-128 by targeting NFSR
AFRICACRYPT'11 Proceedings of the 4th international conference on Progress in cryptology in Africa
Correlation power analysis of Trivium
Security and Communication Networks
Hardware security: threat models and metrics
Proceedings of the International Conference on Computer-Aided Design
Hi-index | 0.00 |
Scan chain based attacks are a kind of side channel attack, which targets one of the most important feature of today's hardware - the test circuitry. Design for Testability (DFT) is a design technique that adds certain testability features to a hardware design. On the other hand, this very feature opens up a side channel for cryptanalysis, rendering crypto-devices vulnerable to scan-based attack. Our work studies scan attack as a general threat to stream ciphers and arrives at a general relation between the design of stream ciphers and their vulnerability to scan attack. Finally, we propose a scheme which we show to thwart the attacks and is more secure than other contemporary strategies.