|
[Adham 99] A. Adham et al., “ Preliminary Outline of IEEE P1500 Scalable Architecture for Testing Embedded Cores,“ Proc. IEEE VLSI Test Symposium, pp. 483-488, 1999. [Biham 97] E. Biham and A. Shamir, “Differential Fault Analysis of Secret Key Cryptosystems,” Lecture Notes in Computer Science, vol. 1294, pp. 513-527, 1997. [Bai 07] Bing-Chuan Bai, “Simultaneous Test Data Volume and Test Application Time Reduction for System-on-Chip,” Master thesis, National Taiwan Univ., Taipei, Taiwan, R.O.C., 2007. [Daemen 98] J. Daemen and R. Rijmen, The Block Cipher Rijndael. Proc. Third Smart Card Research and Advanced Applications Conference, 1998. [Daemen 99] J. Daemen and R. Rijmen, AES Proposal: Rijndael, Version 2, 1999. [Daemen 02] J. Daemen and R. Rijmen, The Design of Rijndael: AES—The Advance Encryption Standard, Springer-Verlag, pp. 31-62, 2002. [DaSilva 03] F. DaSilva, Y. Zorian, L. Whetsel, K. Arabi, R. Kapur, “Overview of the IEEE P1500 Standard,” Proc. IEEE International Test Conference, pp. 887-889, 2003. [Goering 04] R. Goering, “Scan Design Called Portal for Hackers,” EE Times, 2004. [Hafner 91] K. Hafner, H. C. Ritter, T. M. Schwair, S. Wallstab, M. Deppermann, J. Gessner, S. Koesters, W. D. Moeller, and G. Sanweg, “Design and test of an integrated cryptochip,” Proc. IEEE Design and Test of Computers, pp. 6-17, 1991. [Hely 04] D. Hely, M-L. Flottes, F. Bancel, B. Rouzeyre, N. Berard, and M. Renovell, “Scan Design and Secure Chip,” Proc. International On-Line Test Symposium, pp. 219-226, 2004. [Hely 05] D. Hely, M-L. Flottes, F. Bancel, and B. Rouzeyre, “Test Control for Secure Scan Designs,” Proc. European Test Symposium, pp. 190-195, 2005. [Hely 06a] D. Hely, M-L. Flottes, F. Bancel, and B. Rouzeyre, “A Secure Scan Design Methodology,” Proc. Design Automation and Test in European Conference, pp. 1177-1178, 2006. [Hely 06b] D. Hely, M-L. Flottes, F. Bancel, and B. Rouzeyre, “Secure Scan Techniques: a Comparison,” Proc. International On-Line Test Symposium, pp. 119-124, 2006. [IEEE 1149.1] ”Standard Test Access Port and Boundary Scan Architecture,“ IEEE Std. 1149.1-2001. [IEEE 1500] IEEE Computer Society, “IEEE Standard Testability Method for Embedded Core-based Integrated Circuits,” IEEE Std. 1500-2005, pp. 1-117. [IEEE 1450.6] “IEEE Standard Test Interface Language (STIL) for Digital Test Vector Data-Core Test Language (CTL),” IEEE Std. 1450.6-2005. [Kao 07] Tsung-Ping Kao, “IEEE 1500 Compatible Test Wrapper Design and Validation for At-Speed Delay Testing,” Master thesis, National Taiwan Univ., Taipei, Taiwan, R.O.C., 2007. [Kapoor 04] R. Kapoor, “Security vs. test quality: Are they mutually exclusive?” Proc. International Test Conference, pp. 1414, 2004. [Kapur 01] Rohit Kapur, Maurice Lousberg, Tony Taylor, Brion Keller, Paul Reuter, and Douglas Kay, “CTL the language for describing Core-based testing,” Proc. IEEE International Test Conference, pp. 131, 2001. [Karri 01] R. Karri, K. Wu, and P. Mishra, ”Fault-Based Side-Channel Cryptanalysis Tolerant Architecture for Rijndael Symmetric Block Cipher,” Proc. IEEE International Symposium on Defect and Fault Tolerance in VLSI Systems, pp. 427-435, 2001. [Kelsey 98] J. Kelsey, B. Schneier, D. Wagner, and C. Hall, “Side Channel Cryptanalysis of Product Ciphers,” Proc. of the European Symposium on Research in Computer Security, pp. 97-110, 1998. [Kocher 99] P. Kocher, J. Jaffe, and B. Jun, ”Differential Power Analysis,” Lecture Notes in Computer Science, vol. 1666, pp. 388-397, 1999. [Kocher 04] P. Kocher, R. Lee, G. McGraw, A. Raghunathan, and S. Ravi, “Security as a New Dimension in Embedded System Design,” Proc. of the 41st annual conference on Design automation, pp. 753-760, 2004. [Kommerling 99] O. Kommerling and M. G. Kuhn, “Design Principle for Tamper Resistant Smartcard Processors,” USENIX Workshop on Smartcard Technology, pp. 9-20, 1999. [Lee 05] J. Lee, M. Tehranipoor, C. Patel, and J. Plusquellic, “Securing Scan Design Using Lock and Key Technique,” Proc. Defect and Fault Tolerance in VLSI Systems, pp. 51-62, 2005. [Lee 06] J. Lee, M. Tehranipoor, C. Patel, and J. Plusquellic, “A Low-Cost Solution for Protecting IPs against Scan-Based Side-Channel Attacks,” Proc. IEEE VLSI Test Symposium, pp. 94-99, 2006. [Li 05] J. F. Li and C. S. Wu, “Design-for-Testability and Testing of P1500 Test Wrapper,” Proc. VLSI Design/CAD symposium, pp. 254-257, 2005. [Liao 05] Yu-Te Liao, “A Two-Level Test Data Compression and Test Time Reduction Technique for SOC,” Master thesis, National Taiwan Univ., Taipei, Taiwan, R.O.C., 2005. [Liu 07] C. Liu and Y. Huang, “Effects of Embedded Decompression and Compaction Architectures on Side-Channel Attack Resistance,” Proc. IEEE VLSI Test Symposium, pp. 461-468, 2007. [Marinissen 99] E. J. Marinissen, Y. Zorian, R. Kapur, T. Taylor, and L. Whetsel, ”Overview of the IEEE P1500 Standard,” Proc. IEEE International Test Conference, pp. 887-889, 2003. [Mukhopadhyay 05] D. Mukhopadhyay, S. Banerjee, D. RoyChowdhury, and B.B. Bhattacharya, “CryptoScan: A Secured Scan Chain Architecture,” Proc. Asian Test Symposium, pp. 348-353, 2005. [Paul 07] S. Paul, R.S. Chakraborty, and S. Bhunia, “Vim-Scan: A Low Overhead Scan Design Approach for Protection of Secret Key in Scan-Based Secure Chips,” Proc. IEEE VLSI Test Symposium, pp. 455-460, 2007. [Ravi 04] S. Ravi, A. Raghunathan, and S. Chakradhar, “Tamper Resistance Mechanisms for Secure Embedded Systems,” Proc. International Conference on VLSI Design, pp. 605-611, 2004. [Renaudin 04] M. Renaudin, F. Bouesse, Ph. Proust, J.P. Tual, L. Sourqen, and F. Germain, “High security smartcards,” Proc. Design, Automation and Test in Europe Conference, pp. 228-232, 2004. [Sengar 07] G. Sengar, D. Mukhopadhyay, and D.R. Chowdhury, “Secured Flipped Scan-Chain Model for Crypto-Architecture,” Proc. IEEE Trans. on Computer-Aided Design of Integrated Circuits and Systems, Vol. 26, no. 11, pp. 2080-2084, 2007. [DesignCompiler] Synopsys Inc., “Design Compiler User Guide,” Sep. 2005. [TetraMAX] Synopsys Inc., “TetraMAX ATPG User Guide,” Sep. 2005. [Tiri 05] K. Tiri and I. Verbauwhede, “A VLSI Design Flow for Secure Side-Channel Attack Resistant ICs,” Proc. Design Automation and Test in Europe, pp. 58-63, 2005. [Trappe 05] W. Trappe and L. C. Washington, Introduction to cryptography with coding theory, Pearson Prentice Hall, 2005. [Wu 02] C. W. Wu, “Core-based SOC Testing,” VLSI Testing and Design for Testability (Ⅱ), course handouts, 2002. [Wang 03] Hsin-Chung Wang, Chih-Hsiu Lin, and An-Yeu Wu, “Design and Implementation of a Cost-efficient AES Cryptographic Engine,” Bulletin of Engineering School, National Taiwan University, no. 88, pp. 51-60, June 2003. [Wu 06] Po-Lin Wu, “Implementation of an IEEE 1500 Test Wrapper Generation Validation and Power Estimation Tool,” Master thesis, National Taiwan Univ., Taipei, Taiwan, R.O.C., 2006. [Yang 04] B. Yang, K. Wu, and R. Karri, “Scan-based Side-Channel Attack on Dedicated Hardware Implementations on Data Encryption Standard,” Proc. International Test Conference, pp. 339-344, 2004. [Yang 05] B. Yang, K. Wu, and R. Karri, “Secure Scan: A Design-for-Test Architecture for Crypto Chips,” Proc. Design Automatic Conference, pp. 135-140, 2005. [Zhou 05] YongBin Zhou, and DengGuo Feng, “Side channel attacks: ten years after its publication and the impacts on cryptographic module security testing,” http://eprint.iacr.org/2005/388, 2005. [Zorian 05] Yervant Zorian, Avetik Yessayan, “IEEE 1500 Utilization in SOC Design and Test”, Proc. IEEE International Test Conference, pp. 543-552, 2005.
|