2010
DOI: 10.1007/s10836-010-5170-y
|View full text |Cite
|
Sign up to set email alerts
|

JTAG Security System Based on Credentials

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
23
0

Year Published

2013
2013
2022
2022

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 24 publications
(23 citation statements)
references
References 10 publications
0
23
0
Order By: Relevance
“…An elaborate three-party secure JTAG protocol using certificates involving SHA-1 hash algorithm, AES block cipher and several arithmetic operators is presented in [12]. The authors describe the possible attack cases, but the protocol is not proven to be secure.…”
Section: Previous Workmentioning
confidence: 99%
See 4 more Smart Citations
“…An elaborate three-party secure JTAG protocol using certificates involving SHA-1 hash algorithm, AES block cipher and several arithmetic operators is presented in [12]. The authors describe the possible attack cases, but the protocol is not proven to be secure.…”
Section: Previous Workmentioning
confidence: 99%
“…Hence, as shown in the table, we require for design I a total of 46716 GEs and 47050 GEs for Design II to implement the secure JTAG Scheme with the Schnorr and ECDSA controllers. We choose the solution described in [12] for having an estimative of area overhead of our approach. The cost of that solution is 25k gates.…”
Section: Area Overheadmentioning
confidence: 99%
See 3 more Smart Citations