National audienceCrypto-processors are the target of attacks. For instance, an attacker may exploit facilities offered by scan chains to retrieve embedded secret data closely related to the key. However, scan design is the most popular and efficient method to test circuit. The goal of the technique proposed here is to preserve test efficiency, diagnostic and debug while counteracting security threats. This solution relies on using the secret key already stored in the circuit under test in order to encrypt test patterns by adding extra blocks ciphers. Both control and observed test data are thus unusable without the knowledge of the key. Manufacturing test is the process to sort fault-free from faulty circuits. It guarantees a high level of ...
Due to increase in threats posed by offshore foundries, the companies outsourcing IPs are forced to ...
Scan chain-based attacks are side-channel attacks focusing on one of the most significant features o...
National audienceScan chains offer facilities to steal secret information embedded in a circuit. For...
Scan attacks exploit facilities offered by scan chains to retrieve embedded secret data, in particul...
International audienceScan attacks exploit facilities offered by scan chains to retrieve embedded se...
Abstract — Hardware implementation of cryptographic algorithms is subject to various attacks. It has...
Abstract—Hardware implementation of cryptographic algorithms is subject to various attacks. It has b...
Relying on a recently developed gate-level information assurance scheme, we formally analyze the sec...
International audienceCryptographic algorithms are used to protect sensitive information from untrus...
International audienceStructural testing is one important step in the production of integrated circu...
VI. CONCLUSION In this paper, a flipped scan-chain architecture is proposed to test cryptographic de...
International audienceSecurity in the Integrated Circuits (IC) domain is an important challenge, esp...
International audienceScan-based design-for-testability, which improves access and thus the test qua...
Scan test is widely used in integrated circuit test. However, the excellent observability and contro...
International audienceTesting is a mandatory step in the Integrated Circuit (IC) production because ...
Due to increase in threats posed by offshore foundries, the companies outsourcing IPs are forced to ...
Scan chain-based attacks are side-channel attacks focusing on one of the most significant features o...
National audienceScan chains offer facilities to steal secret information embedded in a circuit. For...
Scan attacks exploit facilities offered by scan chains to retrieve embedded secret data, in particul...
International audienceScan attacks exploit facilities offered by scan chains to retrieve embedded se...
Abstract — Hardware implementation of cryptographic algorithms is subject to various attacks. It has...
Abstract—Hardware implementation of cryptographic algorithms is subject to various attacks. It has b...
Relying on a recently developed gate-level information assurance scheme, we formally analyze the sec...
International audienceCryptographic algorithms are used to protect sensitive information from untrus...
International audienceStructural testing is one important step in the production of integrated circu...
VI. CONCLUSION In this paper, a flipped scan-chain architecture is proposed to test cryptographic de...
International audienceSecurity in the Integrated Circuits (IC) domain is an important challenge, esp...
International audienceScan-based design-for-testability, which improves access and thus the test qua...
Scan test is widely used in integrated circuit test. However, the excellent observability and contro...
International audienceTesting is a mandatory step in the Integrated Circuit (IC) production because ...
Due to increase in threats posed by offshore foundries, the companies outsourcing IPs are forced to ...
Scan chain-based attacks are side-channel attacks focusing on one of the most significant features o...
National audienceScan chains offer facilities to steal secret information embedded in a circuit. For...