메뉴 건너뛰기




Volumn 18, Issue 2, 2010, Pages 329-333

Self-test techniques for crypto-devices

Author keywords

Digital circuit testing; Security; Self testing

Indexed keywords

ALIASING; AREA OVERHEAD; FAULT COVERAGES; HOST DEVICES; PSEUDO-RANDOM TESTS; RESPONSE ANALYSIS; RESPONSE COMPACTION; SCAN CHAIN; SELF-TEST; SELF-TESTING; SYMMETRIC ENCRYPTION;

EID: 75549090537     PISSN: 10638210     EISSN: None     Source Type: Journal    
DOI: 10.1109/TVLSI.2008.2010045     Document Type: Article
Times cited : (32)

References (22)
  • 4
    • 0020259648 scopus 로고
    • Self-testing of multichip logic modules
    • Nov.
    • P. H. Bardell and W. H. McAnney, "Self-testing of multichip logic modules," in Proc. Int. Test Conf., Nov. 1982, pp. 200-204.
    • (1982) Proc. Int. Test Conf. , pp. 200-204
    • Bardell, P.H.1    McAnney, W.H.2
  • 5
    • 18144420462 scopus 로고    scopus 로고
    • Scan-based side-channel attack on dedicated hardware implementations on data encryption standard
    • B.Yang, K.Wu, and R. Karri, "Scan-based side-channel attack on dedicated hardware implementations on data encryption standard," in Proc. Int. Test Conf., 2004, pp. 339-344.
    • (2004) Proc. Int. Test Conf. , pp. 339-344
    • Yang, B.1    Wu, K.2    Karri, R.3
  • 6
    • 33748329638 scopus 로고    scopus 로고
    • Secure scan: A design-for-test architecture for crypto chips
    • Oct.
    • B. Yang, K. Wu, and R. Karri, "Secure scan: A design-for-test architecture for crypto chips," IEEE Trans. Comput.-Aided Design Integr. Circuits Syst., vol.25, no.10, pp. 2287-2293, Oct. 2006.
    • (2006) IEEE Trans. Comput.-Aided Design Integr. Circuits Syst. , vol.25 , Issue.10 , pp. 2287-2293
    • Yang, B.1    Wu, K.2    Karri, R.3
  • 9
    • 0033707340 scopus 로고    scopus 로고
    • On random pattern testability of cryptographic VLSI cores
    • Jun.
    • A. Schubert and W. Anheier, "On random pattern testability of cryptographic VLSI cores," J. Electron. Test.: Theory Appl., vol.16, no.3, pp. 185-192, Jun. 2000.
    • (2000) J. Electron. Test.: Theory Appl. , vol.16 , Issue.3 , pp. 185-192
    • Schubert, A.1    Anheier, W.2
  • 14
    • 84856043672 scopus 로고
    • A mathematical theory of communication
    • C. Shannon, "A mathematical theory of communication," Bell Syst. Tech. J., vol.27, no.4, pp. 379-423, 1948.
    • (1948) Bell Syst. Tech. J. , vol.27 , Issue.4 , pp. 379-423
    • Shannon, C.1
  • 15
    • 84890522850 scopus 로고
    • Communication theory of secrecy systems
    • C. Shannon, "Communication theory of secrecy systems," Bell Syst. Tech. J., vol.28, no.4, pp. 656-715, 1949.
    • (1949) Bell Syst. Tech. J. , vol.28 , Issue.4 , pp. 656-715
    • Shannon, C.1
  • 16
    • 0001820140 scopus 로고
    • Cryptography and computer privacy
    • H. Feistel, "Cryptography and computer privacy," Sci. Amer. Mag., vol.228, pp. 15-23, 1973.
    • (1973) Sci. Amer. Mag. , vol.228 , pp. 15-23
    • Feistel, H.1
  • 20
    • 33750964153 scopus 로고    scopus 로고
    • Some upper and lower bounds on the coupon collector problem
    • Mar.
    • S. Shioda, "Some upper and lower bounds on the coupon collector problem," J. Comput. Appl. Math., vol.200, no.1, pp. 154-167, Mar. 2007.
    • (2007) J. Comput. Appl. Math. , vol.200 , Issue.1 , pp. 154-167
    • Shioda, S.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.