2007
DOI: 10.1007/s10836-007-5000-z
|View full text |Cite
|
Sign up to set email alerts
|

Securing Scan Control in Crypto Chips

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
27
0

Year Published

2010
2010
2024
2024

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 37 publications
(27 citation statements)
references
References 5 publications
0
27
0
Order By: Relevance
“…The test protocol solution consists of disabling the test feature in user mode (i.e., when the system is handling confidential data). To protect confidential data processed by the circuit, such as keys, it has been proposed in [3] to modify the usual test protocol so that before entering in test mode, the circuit is completely reset. Then the reset circuit is checked.…”
Section: A Protocol Levelmentioning
confidence: 99%
See 4 more Smart Citations
“…The test protocol solution consists of disabling the test feature in user mode (i.e., when the system is handling confidential data). To protect confidential data processed by the circuit, such as keys, it has been proposed in [3] to modify the usual test protocol so that before entering in test mode, the circuit is completely reset. Then the reset circuit is checked.…”
Section: A Protocol Levelmentioning
confidence: 99%
“…In [4], the authors propose to add data integrity logic control to the signals driving the MKR so that they detect any fault or brute attack leading to scan activation during the user mode. In [3], the authors identify the scan-enable signal as a high-risk signal since it drives the scan function of each scanned flip-flop. They then propose to add an integrity mechanism to this signal so that any activation of this signal while the chip is in user mode will trigger a hard reset of the circuit.…”
Section: B Scan Chain-level Protectionmentioning
confidence: 99%
See 3 more Smart Citations