IEEE Standard Test Access Port and Boundary-Scan Architecture, IEEE Std, 1990. ,
, IEEE Standard Testability Method for Embedded Core-based Integrated Circuits, IEEE Std, pp.1500-2005, 2012.
, IEEE Standard for Access and Control of Instrumentation Embedded within a Semiconductor Device, 2014.
The Design of Rijndael, 2002. ,
DOI : 10.1007/978-3-662-04722-4
Secure scan, Proceedings of the 42nd annual conference on Design automation , DAC '05, pp.135-140, 2005. ,
DOI : 10.1145/1065579.1065617
Scan Attacks and Countermeasures in Presence of Scan Response Compactors, 2011 Sixteenth IEEE European Test Symposium, pp.19-24, 2011. ,
DOI : 10.1109/ETS.2011.30
Are advanced DfT structures sufficient for preventing scan-attacks? In VTS, pp.246-251, 2012. ,
Scan chain encryption for the test, diagnosis and debug of secure circuits, 2017 22nd IEEE European Test Symposium (ETS), pp.1-6, 2017. ,
DOI : 10.1109/ETS.2017.7968248
URL : https://hal.archives-ouvertes.fr/lirmm-01892667
Experimentations on scan chain encryption with PRESENT, 2017 IEEE 2nd International Verification and Security Workshop (IVSW), pp.45-50, 2017. ,
DOI : 10.1109/IVSW.2017.8031543
URL : https://hal.archives-ouvertes.fr/lirmm-01699258
Attacks and Defenses for JTAG, IEEE Design & Test of Computers, vol.27, issue.1, pp.36-47, 2010. ,
DOI : 10.1109/MDT.2010.9
Security-aware SoC test access mechanisms, 29th VLSI Test Symposium, pp.100-104, 2011. ,
DOI : 10.1109/VTS.2011.5783765
Echeloned IJTAG data protection, 2016 IEEE Asian Hardware-Oriented Security and Trust (AsianHOST), 2016. ,
DOI : 10.1109/AsianHOST.2016.7835558
, TRIVIUM Specifications. ECRYPT Stream Cipher Project, p.30, 2005.