Back to Results
First PageMeta Content
Manufacturing / Joint Test Action Group / Boundary scan / Scan chain / Test compression / Automatic test pattern generation / Block cipher / Man-in-the-middle attack / Side channel attack / Electronic engineering / Electronics / Electronics manufacturing


IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING Received 30 April 2013; revised 6 October 2013; accepted 22 December[removed]Date of publication 5 February 2014; date of current version 7 May 2014.
Add to Reading List

Document Date: 2014-06-16 15:59:17


Open Document

File Size: 1,79 MB

Share Result on Facebook

City

Porto Alegre / SUMMARY OF SCAN / /

Company

Schnorr Protocol / Actel / Freescale Semiconductors / TDI / INDEX TERMS Hardware / Microsoft / the AES / /

Country

France / Brazil / /

Currency

pence / /

/

Event

FDA Phase / /

Facility

University of Leuven / JTAG port / /

IndustryTerm

secure devices / secure protocols / Wireless Sensor Nodes / symmetric-key algorithms / secure server / legitimate device / attack algorithm / test server / manufacturing facilities / hash algorithm / public-key infrastructure / welcome solution / cryptographic algorithm / e-payments / test infrastructure / industrial solutions / response-based protocol / content mining / test daisy chain / public-key algorithms / secure protocol / test solution / cryptographic algorithms / public-key cryptographic protocol / manufacturing test / firmware/software / This solution / ad-hoc solutions / /

NaturalFeature

Trivium stream / /

Organization

US Federal Reserve / University of Leuven / /

Position

test engineer / security controller / cell correspondent / test controller / Secure JTAG Controller / spy / designer / embedded security designer / controller / Belgium CORRESPONDING AUTHOR / /

Product

Affine / iPad / This solution / SHA-1 / /

Technology

challenge-response-based protocol / radiation / JTAG / block cipher / mobile phones / symmetric-key algorithms / secret key / public-key cryptographic protocol / nonvolatile memory / integrated circuits / secure JTAG protocol using credentials involving SHA-1 hash algorithm / public-key infrastructure / cryptographic algorithm / encryption / cryptography / attack algorithm / public key / finite state machine / System-on-Chip / smartphones / public-key algorithms / 1 protocol / manufactured chips / simulation / secure protocol / same algorithm / Digital Object Identifier / stream cipher / integrated circuit / using a stream cipher / /

URL

http /

SocialTag