摘要
Scan-based design for test (DFT) is a powerful and the most popular testing technique. However, while scanbased DFT improves test efficiency, it also leaves a side channel to the privacy information stored in the chip. This paper investigates the side channel and proposes a simple but powerful scan-based attack that can reveal the key and/or state stored in the chips that implement the state-of-the-art stream ciphers with less than 85 scan-out vectors.
| 源语言 | 英语 |
|---|---|
| 页(从-至) | 646-655 |
| 页数 | 10 |
| 期刊 | Journal of Computer Science and Technology |
| 卷 | 29 |
| 期 | 4 |
| DOI | |
| 出版状态 | 已出版 - 1月 2014 |
| 已对外发布 | 是 |
指纹
探究 'Scan-based attack on stream ciphers: A case study on estream finalists' 的科研主题。它们共同构成独一无二的指纹。引用此
- APA
- Author
- BIBTEX
- Harvard
- Standard
- RIS
- Vancouver