International audienceStructural testing is one important step in the production of integrated circuits. The most common DfT technique is the insertion of scan-chains, which increases the observability and the controllability of the circuit's internal nodes. Nevertheless, malicious users can use the scan chains to observe confidential data stored in devices implementing cryptographic primitives. Therefore, scan chains inserted in secure ICs can be considered as a source of information leakage. Several countermeasures exist to cope with this type of problem. However, they either introduce high area overheads or they require modifications to the original design or the test protocol. In this paper we present a smart test controller that is abl...
International audienceCryptographic algorithms are used to protect sensitive information from untrus...
Dans cette thèse, nous analysons les vulnérabilités introduites par les infrastructures de test, com...
VI. CONCLUSION In this paper, a flipped scan-chain architecture is proposed to test cryptographic de...
National audienceCrypto-processors are the target of attacks. For instance, an attacker may exploit ...
International audienceScan attacks exploit facilities offered by scan chains to retrieve embedded se...
Relying on a recently developed gate-level information assurance scheme, we formally analyze the sec...
Abstract — Hardware implementation of cryptographic algorithms is subject to various attacks. It has...
Scan attacks exploit facilities offered by scan chains to retrieve embedded secret data, in particul...
International audienceTesting a secure system is often considered as a severe bottleneck. While test...
International audienceThe design of secure ICs requires fulfilling means conforming to many design r...
Scan test is widely used in integrated circuit test. However, the excellent observability and contro...
Test infrastructures are crucial to the modern Integrated Circuits (ICs) industry. The necessity of ...
Abstract—Hardware implementation of cryptographic algorithms is subject to various attacks. It has b...
Abstract — Scan designs used for testing also provide an easily accessible port for hacking. In this...
International audienceSecurity in the Integrated Circuits (IC) domain is an important challenge, esp...
International audienceCryptographic algorithms are used to protect sensitive information from untrus...
Dans cette thèse, nous analysons les vulnérabilités introduites par les infrastructures de test, com...
VI. CONCLUSION In this paper, a flipped scan-chain architecture is proposed to test cryptographic de...
National audienceCrypto-processors are the target of attacks. For instance, an attacker may exploit ...
International audienceScan attacks exploit facilities offered by scan chains to retrieve embedded se...
Relying on a recently developed gate-level information assurance scheme, we formally analyze the sec...
Abstract — Hardware implementation of cryptographic algorithms is subject to various attacks. It has...
Scan attacks exploit facilities offered by scan chains to retrieve embedded secret data, in particul...
International audienceTesting a secure system is often considered as a severe bottleneck. While test...
International audienceThe design of secure ICs requires fulfilling means conforming to many design r...
Scan test is widely used in integrated circuit test. However, the excellent observability and contro...
Test infrastructures are crucial to the modern Integrated Circuits (ICs) industry. The necessity of ...
Abstract—Hardware implementation of cryptographic algorithms is subject to various attacks. It has b...
Abstract — Scan designs used for testing also provide an easily accessible port for hacking. In this...
International audienceSecurity in the Integrated Circuits (IC) domain is an important challenge, esp...
International audienceCryptographic algorithms are used to protect sensitive information from untrus...
Dans cette thèse, nous analysons les vulnérabilités introduites par les infrastructures de test, com...
VI. CONCLUSION In this paper, a flipped scan-chain architecture is proposed to test cryptographic de...