2012 IEEE Asia Pacific Conference on Circuits and Systems 2012
DOI: 10.1109/apccas.2012.6419108
|View full text |Cite
|
Sign up to set email alerts
|

State dependent scan flip-flop with key-based configuration against scan-based side channel attack on RSA circuit

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 14 publications
(9 citation statements)
references
References 7 publications
0
9
0
Order By: Relevance
“…Using the historic state of CUT to obfuscate the scan data has also been proposed in [25]. The recovery of original output response from the obfuscated test data is a concern without a clear elaboration on how the obfuscation was controlled by the historic state.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Using the historic state of CUT to obfuscate the scan data has also been proposed in [25]. The recovery of original output response from the obfuscated test data is a concern without a clear elaboration on how the obfuscation was controlled by the historic state.…”
Section: Related Workmentioning
confidence: 99%
“…The area overhead, security and impact on testability of the proposed secure design are also compared with other lock and key schemes in Table II. The compared scan protection schemes include SOSD-128 [20], DOSD-128 [22], ROS [19], SDSFF [25], Vim-Scan [33], SSTKR [32], TSC [21], DOS [30] and SIE [31]. ROS-16c refers to the ROS design [19] with 16 sub-chains.…”
Section: Table II Comparison Of Lock and Key Schemesmentioning
confidence: 99%
“…Instead of inserting inverters or XOR gates into the scan chain, [28], [29] proposes the State Dependent Scan Flip-Flop (SDSFF) to replace traditional SFF in the scan chain. As shown in Figure 7, in SDSFF, an XOR gate and a latch are integrated into the traditional SFF.…”
Section: State Dependent Scan Flip-flop Based Scanmentioning
confidence: 99%
“…Although attackers can get access to the scan chain, the effective information cannot be obtained from the obfuscated data any more. Specifically, in this paper, eleven common secure scan designs using this strategy is introduced: Flipped Scan [24], XOR Scan [25], Double Feedback XOR Scan [26], rXOR Scan [27], State Dependent Scan Flip-Flop [28], [29], Dynamically Obfuscated Scan [30], [31], Test Key Integrated Scan [32]- [35], Sub-chains based Scan [36]- [39], Static and Dynamic Obfuscation of Scan [40], [41], and Partial Secure Scan [42], [43]. The second is scan input/output restriction.…”
Section: Introductionmentioning
confidence: 99%
“…In [59], a solution is proposed, which is based on the lock and key of physical unclonable function, but this design method has a particularly high hardware overhead. Some methods resist scan-based attacks by reordering scan chains [60][61][62][63][64][65][66][67][68][69].…”
Section: Introductionmentioning
confidence: 99%