搜索结果: 1-5 共查到“军事学 Z-Scan”相关记录5条 . 查询时间(0.062 秒)
Dynamically Obfuscated Scan Chain To Resist Oracle-Guided Attacks On Logic Locked Design
SAT attack Logic locking Secure scan
2019/8/20
Logic locking has emerged as a promising solution against IP piracy and modification by untrusted entities in the integrated circuit design process. However, its security is challenged by boolean sati...
A Generic Scan Attack on Hardware based eStream Winners
Scan Attack eStream Winners Side Channel Attack
2016/1/23
Scan chains, a design for testability (DFT) feature, are included in most modern-day ICs. But, it opens a side channel for attacking cryptographic chips. We propose a methodology by which we can re...
Single Layer Optical-scan Voting with Fully Distributed Trust
cryptographic protocols / election schemes
2012/3/23
We present a new approach for cryptographic end-to-end verifiable optical-scan voting. Ours is the first that does not rely on a single point of trust to protect ballot secrecy while simultaneously of...
Scan-based Attacks on Linear Feedback Shift Register Based Stream Ciphers
Stream Ciphers LFSRs Scan DFT
2009/12/29
In this paper, we present an attack on stream cipher implementations by determining the scan chain structure of the linear feedback shift registers in their implementations. Although scan Design-for-T...
Scan Based Side Channel Attack on Data Encryption Standard
Scan Based Side Channel Attack Data Encryption Standard
2009/3/25
Scan based test is a double edged sword. On one hand,
it is a powerful test technique. On the other hand, it is an
equally powerful attack tool. In this paper we show that
scan chains can be used a...