“…Several types of research have focused on the scan-based attacks on hardware implementations of famous encryption algorithms, e.g. Advanced Encryption Standard (AES) [10][11][12][13][14][15], Data Encryption Standard (DES) [1,12], Rivest-Shamir-Adleman (RSA) [12,16,17] and some stream ciphers such as e-Stream [18] and Trivium [19]. In contrast, various countermeasures such as key mirroring [10], on-chip comparison [20], dynamic scan chain [21], partial scan chain [22], access prevention to scan chain [23], round register masking [13], and scan chain obfuscation [24] have been proposed to cope with scan-based attacks.…”