Boundary scan security enhancements for a cryptographic hardware

1Citations
Citations of this article
2Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Boundary scan (JTAG) is a powerful testing scheme that is widely used in nowadays circuits to maintain and verify operation of the hardware. However, JTAG is not used in cryptographic hardware since it may be used to compromise security of the implemented cryptographic algorithm. This paper analyses different solutions proposed to overcome the threat of such attacks, presents requirements that have to be satisfied in order to construct effective security solution, and presents novel proposal that improves security of the boundary scan. © 2009 Springer-Verlag Berlin Heidelberg.

Cite

CITATION STYLE

APA

Nikodem, M. (2009). Boundary scan security enhancements for a cryptographic hardware. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 5717 LNCS, pp. 91–97). https://doi.org/10.1007/978-3-642-04772-5_13

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free