2021
DOI: 10.1371/journal.pone.0261431
|View full text |Cite
|
Sign up to set email alerts
|

A dual mode self-test for a stand alone AES core

Abstract: Advanced Encryption Standard (AES) is the most secured ciphertext algorithm that is unbreakable in a software platform’s reasonable time. AES has been proved to be the most robust symmetric encryption algorithm declared by the USA Government. Its hardware implementation offers much higher speed and physical security than that of its software implementation. The testability and hardware Trojans are two significant concerns that make the AES chip complex and vulnerable. The problem of testability in the complex … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(4 citation statements)
references
References 70 publications
0
4
0
Order By: Relevance
“…This is because in testing using the partial-scan method, the number of flip flops that are converted into scannable flip flops is only partial or incomplete. To find out which flip flop will be used as a scannable flip flop, we can analyze the circuit with several approaches, in this case we use FSM based [19]. We proposed custom approach with the largest number of inputs and outputs of selected flip flops to achieve high result of fault coverage and test coverage as in Figure 8., Table 1 and Table 2.…”
Section: Circuit Testing With the Partial-scan Methodsmentioning
confidence: 99%
“…This is because in testing using the partial-scan method, the number of flip flops that are converted into scannable flip flops is only partial or incomplete. To find out which flip flop will be used as a scannable flip flop, we can analyze the circuit with several approaches, in this case we use FSM based [19]. We proposed custom approach with the largest number of inputs and outputs of selected flip flops to achieve high result of fault coverage and test coverage as in Figure 8., Table 1 and Table 2.…”
Section: Circuit Testing With the Partial-scan Methodsmentioning
confidence: 99%
“…Hossain et al. [ 35 ] proposed a safety model to avoid IP theft from microfluidic biochips at various stages of the biochip design process for drive sequences. Moreover, the joint extension of split manufacturing and camouflaging techniques to 3D integration in [ 52 ] is an important step forward in the prevention of hardware Trojans.…”
Section: Related Workmentioning
confidence: 99%
“…The security problem of hardware Trojans can be broadly divided into three parts: detection, localization, and failure, where the detection method of hardware Trojans has achieved excellent results by many research teams worldwide. For example, the use of a dual-mode self-test architecture approach for detecting hardware Trojans in design, manufacturing, and testing is mentioned in [35]. Sabri et al [36] proposed an SAT-Based integrated hardware Trojan detection and a localization approach through path-delay analysis.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation