2022
DOI: 10.1109/tsmc.2020.3036879
|View full text |Cite
|
Sign up to set email alerts
|

Ensuring Cryptography Chips Security by Preventing Scan-Based Side-Channel Attacks With Improved DFT Architecture

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6

Relationship

1
5

Authors

Journals

citations
Cited by 15 publications
(7 citation statements)
references
References 50 publications
0
5
0
Order By: Relevance
“…The scan architecture proposed in [20] receives the test password consisting of the load password and the scan password using primary inputs of the cryptography chip. If the load password is correct, the scan password can be loaded into the cyclic shift register (CSR).…”
Section: Previous Work a Previous Countermeasuresmentioning
confidence: 99%
See 2 more Smart Citations
“…The scan architecture proposed in [20] receives the test password consisting of the load password and the scan password using primary inputs of the cryptography chip. If the load password is correct, the scan password can be loaded into the cyclic shift register (CSR).…”
Section: Previous Work a Previous Countermeasuresmentioning
confidence: 99%
“…Table 3 presents a comparison between the security of the proposed secure scan architecture and the previous approaches. The reported results for scan chain encryption [22] are assumed to use SKINNY-64-128, and the results of improved DFT [20] are assumed to use the 128-bit password assigning 64 bits for the scan password. Secure DFT [16] and HBSDlow [23] do not use an authentication key.…”
Section: ) Comparison With the Previous Approachesmentioning
confidence: 99%
See 1 more Smart Citation
“…With the rapid development and large-scale application of the Internet of Things (IoT) technology, a number of issues and challenges have emerged, including greater concern over the secure transmission of private information. [1][2][3][4][5] The secure transmission of private information cannot be achieved without the information security system provided by cryptography. Therefore, pseudo-random number generators (PRNGs), as the most prevalent information security systems in cryptography, are receiving increasing attention from researchers.…”
Section: Introductionmentioning
confidence: 99%
“…In recent years, several technologies, such as sensor networks [1][2][3][4], wireless communication [5][6][7][8], smart grid [9,10], big data [11,12], and internet of things [13,14], have been developed rapidly and their security has been widely researched [15]. At the same time, the researcher has been paying more and more attention to the security issue of the underlying hardware [16][17][18].…”
Section: Introductionmentioning
confidence: 99%