메뉴 건너뛰기




Volumn , Issue , 2005, Pages 51-59

Securing scan design using lock & key technique

Author keywords

[No Author keywords available]

Indexed keywords

INSECURE MODE; SCAN DESIGN; SECURITY THREAT;

EID: 28444448348     PISSN: 15505774     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (88)

References (22)
  • 1
    • 18144420462 scopus 로고    scopus 로고
    • Scan based side channel attack on dedicated hardware implementations of data encryption standard
    • B. Yang, K. Wu, and R. Karri, "Scan Based Side Channel Attack on Dedicated Hardware Implementations of Data Encryption Standard," in Proc. of the IEEE Int. Test Conf. (ITC), 2004, pp. 339-344.
    • (2004) Proc. of the IEEE Int. Test Conf. (ITC) , pp. 339-344
    • Yang, B.1    Wu, K.2    Karri, R.3
  • 9
    • 84957355967 scopus 로고    scopus 로고
    • On the importance of checking cryptographic protocols for faults
    • D. Boneh, R. A. Demillo, and R. J. Lipton, "On the Importance of Checking Cryptographic Protocols for Faults," Lecture Notes in Computer Science, vol. 1233, pp. 37-51, 1997.
    • (1997) Lecture Notes in Computer Science , vol.1233 , pp. 37-51
    • Boneh, D.1    Demillo, R.A.2    Lipton, R.J.3
  • 10
    • 84958641478 scopus 로고    scopus 로고
    • Differential fault analysis of secret key cryptosystems
    • E. Biham and A. Shamir, "Differential Fault Analysis of Secret Key Cryptosystems," Lecture Notes in Computer Science, vol. 1294, pp. 513-527, 1997.
    • (1997) Lecture Notes in Computer Science , vol.1294 , pp. 513-527
    • Biham, E.1    Shamir, A.2
  • 13
    • 28444496482 scopus 로고    scopus 로고
    • Apr. [Online]
    • S. Scheiber, "The Best-Laid Boards," Apr. 2005. [Online]. Available: http://www.reedelectronics.com/tmworld/article/CA513261.html
    • (2005) The Best-laid Boards
    • Scheiber, S.1
  • 16
    • 84943632039 scopus 로고    scopus 로고
    • Timing attacks on implementations of Diffle-Hellman, RSA, DSS, and other systems
    • P. C. Kocher, "Timing Attacks on Implementations of Diffle-Hellman, RSA, DSS, and Other Systems," Lecture Notes in Computer Science, vol. 1109, pp. 104-113, 1996.
    • (1996) Lecture Notes in Computer Science , vol.1109 , pp. 104-113
    • Kocher, P.C.1
  • 18
  • 21
  • 22
    • 0035687399 scopus 로고    scopus 로고
    • An analysis of power reduction techniques in scan testing
    • J. Saxena, K. M. Butler, and L. Whetsel, "An Analysis of Power Reduction Techniques in Scan Testing," in Proc. Intl. Test Conf., 2001, pp. 670-677.
    • (2001) Proc. Intl. Test Conf. , pp. 670-677
    • Saxena, J.1    Butler, K.M.2    Whetsel, L.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.