The Design of Rijndael, 2002. ,
DOI : 10.1007/978-3-662-04722-4
Secure scan, Proceedings of the 42nd annual conference on Design automation , DAC '05, pp.135-140, 2005. ,
DOI : 10.1145/1065579.1065617
Scan Attacks and Countermeasures in Presence of Scan Response Compactors, 2011 Sixteenth IEEE European Test Symposium, pp.19-24, 2011. ,
DOI : 10.1109/ETS.2011.30
Are advanced DfT structures sufficient for preventing scan-attacks?, 2012 IEEE 30th VLSI Test Symposium (VTS), pp.246-251, 2012. ,
DOI : 10.1109/VTS.2012.6231061
URL : https://hal.archives-ouvertes.fr/lirmm-00694536
New scan-based attack using only the test mode, International Conference on Very Large Scale Integration (VLSI-SoC), pp.234-239, 2013. ,
IEEE Standard Test Access Port and Boundary- Scan Architecture, IEEE Std, 1990. ,
, IEEE Standard Testability Method for Embedded Core-based Integrated Circuits, IEEE Std, pp.1500-2005, 2012.
, IEEE Standard for Access and Control of Instrumentation Embedded within a Semiconductor Device, 2014.
PRESENT: An Ultra-Lightweight Block Cipher, CHES 2007, pp.450-466, 2007. ,
DOI : 10.1007/978-3-540-74735-2_31
, TRIVIUM Specifications " . ECRYPT Stream Cipher Project, Report, p.30, 2005.
Attacks and defenses for JTAG, IEEE Design and Test of Computers, pp.36-47, 2010. ,
Security-aware SoC test access mechanisms, 29th VLSI Test Symposium, pp.100-104, 2011. ,
DOI : 10.1109/VTS.2011.5783765
Echeloned IJTAG data protection, 2016 IEEE Asian Hardware-Oriented Security and Trust (AsianHOST), 2016. ,
DOI : 10.1109/AsianHOST.2016.7835558
Scan chain encryption for the test, diagnosis and debug of secure circuits, 2017 22nd IEEE European Test Symposium (ETS), pp.1-6, 2017. ,
DOI : 10.1109/ETS.2017.7968248
URL : https://hal.archives-ouvertes.fr/lirmm-01892667
Experimentations on scan chain encryption with PRESENT, 2017 IEEE 2nd International Verification and Security Workshop (IVSW), pp.45-50 ,
DOI : 10.1109/IVSW.2017.8031543
URL : https://hal.archives-ouvertes.fr/lirmm-01699258