Scan Based Side Channel Attack on Dedicated Hardware Implementations of Data Encryption Standard, Proceedings IEEE International Test Conference (ITC), 2004. ,
Secure Scan: A Design-for-Test Architecture for Crypto Chips, Proceedings ACM/IEEE Design Automation Conference (DAC), pp.135-140, 2005. ,
An Efficient Approach to Develop Secure Scan Tree for Crypto-Hardware, 15th International Conference on Advanced Computing and Communications ,
Partial Scan Approach for Secret Information Protection, European Test Symposium, pp.143-148, 2009. ,
ScanBased Side-Channel Attack Against RSA Cryptosystems Using Scan Signatures, IEICE Transaction Fundamentals, issue.12, 2010. ,
,
,
VirtualScan: a new compressed scan technology for test cost reduction, Proceedings. ITC 2004. International, pp.26-28, 2004. ,
Embedded deterministic test. ComputerAided Design of Integrated Circuits and Systems, IEEE Transactions on, vol.23, issue.5, pp.776-792, 2004. ,
X-compact: an efficient response compaction technique for test cost reduction, Proc. ITC, pp.311-320, 2002. ,
Effects of Embedded Decompression and Compaction Architectures on Side-Channel Attack Resistance. 25th IEEE VLSI Test Symposium (VTS), 2007. ,
Scan-Based Attack against Elliptic Curve Cryptosystems, Asia South-Pacific Design Automatic Conference, p.2010 ,
Scan-based Attacks on Linear Feedback Shift Register Based Stream Ciphers, ACM Transactions on Design Automation of Electronic Systems, 2011. ,
Challenge-response based secure test wrapper for testing cryptographic circuits, IEEE European Test Symposium, 2011. ,
Scan Design and Secure Chip, 10th IEEE International On-Line Testing Symposium (IOLTS'04) ,
Test Control for Secure Scan Designs, European Test Symposium (ETS'05) ,
New security threats against chips containing scan chain structures. Hardware Oriented Security and Trust (HOST), 2011. ,
URL : https://hal.archives-ouvertes.fr/lirmm-00599690
Scan attacks and countermeasures in presence of scan response compactors, 16th IEEE European Test Symposium (ETS), p.2011 ,
URL : https://hal.archives-ouvertes.fr/lirmm-00647062
Chapter 14. Efficient Implementations. Handbook of Applied Cryptography, 1996. ,
, Gezel Hardware/Software Codesign Environment