2004 International Conferce on Test
DOI: 10.1109/test.2004.1386969
|View full text |Cite
|
Sign up to set email alerts
|

Scan based side channel attack on dedicated hardware implementations of Data Encryption Standard

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
180
0

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 184 publications
(180 citation statements)
references
References 4 publications
0
180
0
Order By: Relevance
“…A scan path model is shown The purpose of a scan-based attack against RSA is to retrieve a secret exponent d from scanned data in an RSA circuit. Scan-based attack here requires several assumptions as in the previous researches in (Nara et al, 2009;2011;Yang et al, 2004;, which are summarized as shown below:…”
Section: Scan-based Attack Against Rsamentioning
confidence: 99%
See 1 more Smart Citation
“…A scan path model is shown The purpose of a scan-based attack against RSA is to retrieve a secret exponent d from scanned data in an RSA circuit. Scan-based attack here requires several assumptions as in the previous researches in (Nara et al, 2009;2011;Yang et al, 2004;, which are summarized as shown below:…”
Section: Scan-based Attack Against Rsamentioning
confidence: 99%
“…Yang et al first showed a scan-based side-channel attack against DES in 2004 and retrieved a secret key in DES (Yang et al, 2004). They also proposed a scan-based side-channel attack against AES in (Yang et al, 2006.…”
Section: Introductionmentioning
confidence: 99%
“…In [1], Yang et al present a new side-channel attack against the Data Encryption Standard (DES), exploiting the observability provided by the scan chain mechanism. They show the same kind of attack against the AES (Advanced Encryption Standard).…”
Section: A Test Hazardsmentioning
confidence: 99%
“…Securing the test protocol, as seen in [1] and [3], has the advantage that even if one bypasses the authentication and uses the test features as a test engineer, no confidential data will be outputted. If data scrambling or pattern watermarking are implemented without protocol security, an attacker who gets the authentication will furnish the correct authentication to disable the scrambling or the watermarking and will then be able to unload confidential data.…”
Section: A Securitymentioning
confidence: 99%
See 1 more Smart Citation