N. Garg, S. Kataria, A. Mahajan, and A. Jindal, Freescale Semiconductor), LBIST -A technique for infield safety, Design&Reuse, 2015.

, IEEE Standard for Access and Control of Instrumentation Embedded within a Semiconductor Device, IEEE, pp.1687-2014, 2014.

J. Dworak, A. Crouch, J. Potter, A. Zygmontowicz, and M. Thornton, Don't Forget to Lock your SIB: Hiding Instruments using P1687, IEEE International Test Conference, 2013.

A. Zygmontowicz, J. Dworak, A. Crouch, and J. Potter, Making it harder to unlock an LSIB: Honeytraps and misdirection in a P1687 network, Design, Automation and Test in Europe Conference and Exhibition, 2014.

E. Koopahi and S. E. Borujeni, Secure scan-based design using Blum Blum Shub algorithm, East-West Design & Test Symposium (EWDTS), 2016.

M. Aigner and M. Feldhofer, Secure Symmetric Authentication for RFID Tags, Telecommunication and Mobile Computing, 2005.

J. Da-rolt, S. Ghosh, S. Seys, S. Dupuis, G. D. Natale et al., Secure JTAG implementation using Schnorr protocol, Journal of Electronic Testing, pp.193-209, 2013.
URL : https://hal.archives-ouvertes.fr/lirmm-00837904

B. Rafal, K. , and H. Wunderlich, Fine-Grained Access Management in Reconfigurable Scan Networks, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, vol.34, pp.934-947, 2015.

A. Tsertov, A. Jutman, S. Devadze, M. Sonza-reorda, E. Larsson et al.,

, Benchmark Networks, 47th IEEE International Test Conference, 2016.

E. Valea, M. Mathieu-da-silva, G. D. Flottes, B. Natale, and . Rouzeyre, Stream vs block ciphers for scan encryption, Microelectronics Journal, vol.86, pp.65-76, 2019.