“…To have an efficient attack tolerance mechanism, we need to consider this fact. For example, a gate-level vulnerability model proposed in [26] is based on the fact that preventing the first step of a structural scan-based attack, i.e. extracting the input to scan cell(s) mapping, would save the ground of the crypto-chip against structural scan-based attacks.…”