{"id":"https://openalex.org/W2577458447","doi":"https://doi.org/10.1109/apccas.2016.7803938","title":"Implementation evaluation of scan-based attack against a Trivium cipher circuit","display_name":"Implementation evaluation of scan-based attack against a Trivium cipher circuit","publication_year":2016,"publication_date":"2016-10-01","ids":{"openalex":"https://openalex.org/W2577458447","doi":"https://doi.org/10.1109/apccas.2016.7803938","mag":"2577458447"},"language":"en","primary_location":{"id":"doi:10.1109/apccas.2016.7803938","is_oa":false,"landing_page_url":"https://doi.org/10.1109/apccas.2016.7803938","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2016 IEEE Asia Pacific Conference on Circuits and Systems (APCCAS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5081263049","display_name":"Daisuke Oku","orcid":"https://orcid.org/0000-0001-8611-9624"},"institutions":[{"id":"https://openalex.org/I150744194","display_name":"Waseda University","ror":"https://ror.org/00ntfnx83","country_code":"JP","type":"education","lineage":["https://openalex.org/I150744194"]}],"countries":["JP"],"is_corresponding":true,"raw_author_name":"Daisuke Oku","raw_affiliation_strings":["Dept. of Computer Science and Communications Engineering, Waseda University"],"affiliations":[{"raw_affiliation_string":"Dept. of Computer Science and Communications Engineering, Waseda University","institution_ids":["https://openalex.org/I150744194"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5061982025","display_name":"Masao Yanagisawa","orcid":"https://orcid.org/0000-0002-5168-3214"},"institutions":[{"id":"https://openalex.org/I150744194","display_name":"Waseda University","ror":"https://ror.org/00ntfnx83","country_code":"JP","type":"education","lineage":["https://openalex.org/I150744194"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Masao Yanagisawa","raw_affiliation_strings":["Dept. of Computer Science and Communications Engineering, Waseda University"],"affiliations":[{"raw_affiliation_string":"Dept. of Computer Science and Communications Engineering, Waseda University","institution_ids":["https://openalex.org/I150744194"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5087516286","display_name":"Nozomu Togawa","orcid":"https://orcid.org/0000-0003-3400-3587"},"institutions":[{"id":"https://openalex.org/I150744194","display_name":"Waseda University","ror":"https://ror.org/00ntfnx83","country_code":"JP","type":"education","lineage":["https://openalex.org/I150744194"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Nozomu Togawa","raw_affiliation_strings":["Dept. of Computer Science and Communications Engineering, Waseda University"],"affiliations":[{"raw_affiliation_string":"Dept. of Computer Science and Communications Engineering, Waseda University","institution_ids":["https://openalex.org/I150744194"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5081263049"],"corresponding_institution_ids":["https://openalex.org/I150744194"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.16964454,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":"5365","issue":null,"first_page":"220","last_page":"223"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T14117","display_name":"Integrated Circuits and Semiconductor Failure Analysis","score":0.9983000159263611,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9980999827384949,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/stream-cipher","display_name":"Stream cipher","score":0.789232611656189},{"id":"https://openalex.org/keywords/cipher","display_name":"Cipher","score":0.7396861910820007},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.699345052242279},{"id":"https://openalex.org/keywords/field-programmable-gate-array","display_name":"Field-programmable gate array","score":0.6499748826026917},{"id":"https://openalex.org/keywords/scan-chain","display_name":"Scan chain","score":0.6291261911392212},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.5864613056182861},{"id":"https://openalex.org/keywords/chip","display_name":"Chip","score":0.539563000202179},{"id":"https://openalex.org/keywords/running-key-cipher","display_name":"Running key cipher","score":0.516414225101471},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.4894813299179077},{"id":"https://openalex.org/keywords/stream-cipher-attack","display_name":"Stream cipher attack","score":0.41257917881011963},{"id":"https://openalex.org/keywords/computer-hardware","display_name":"Computer hardware","score":0.40821224451065063},{"id":"https://openalex.org/keywords/parallel-computing","display_name":"Parallel computing","score":0.3215257525444031},{"id":"https://openalex.org/keywords/integrated-circuit","display_name":"Integrated circuit","score":0.24315738677978516},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.22538581490516663},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.19477131962776184},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.17736029624938965},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.06602093577384949}],"concepts":[{"id":"https://openalex.org/C92950451","wikidata":"https://www.wikidata.org/wiki/Q864718","display_name":"Stream cipher","level":3,"score":0.789232611656189},{"id":"https://openalex.org/C2780221543","wikidata":"https://www.wikidata.org/wiki/Q4681865","display_name":"Cipher","level":3,"score":0.7396861910820007},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.699345052242279},{"id":"https://openalex.org/C42935608","wikidata":"https://www.wikidata.org/wiki/Q190411","display_name":"Field-programmable gate array","level":2,"score":0.6499748826026917},{"id":"https://openalex.org/C150012182","wikidata":"https://www.wikidata.org/wiki/Q225990","display_name":"Scan chain","level":3,"score":0.6291261911392212},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5864613056182861},{"id":"https://openalex.org/C165005293","wikidata":"https://www.wikidata.org/wiki/Q1074500","display_name":"Chip","level":2,"score":0.539563000202179},{"id":"https://openalex.org/C64119674","wikidata":"https://www.wikidata.org/wiki/Q7380031","display_name":"Running key cipher","level":4,"score":0.516414225101471},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.4894813299179077},{"id":"https://openalex.org/C96675983","wikidata":"https://www.wikidata.org/wiki/Q7622661","display_name":"Stream cipher attack","level":4,"score":0.41257917881011963},{"id":"https://openalex.org/C9390403","wikidata":"https://www.wikidata.org/wiki/Q3966","display_name":"Computer hardware","level":1,"score":0.40821224451065063},{"id":"https://openalex.org/C173608175","wikidata":"https://www.wikidata.org/wiki/Q232661","display_name":"Parallel computing","level":1,"score":0.3215257525444031},{"id":"https://openalex.org/C530198007","wikidata":"https://www.wikidata.org/wiki/Q80831","display_name":"Integrated circuit","level":2,"score":0.24315738677978516},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.22538581490516663},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.19477131962776184},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.17736029624938965},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.06602093577384949},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/apccas.2016.7803938","is_oa":false,"landing_page_url":"https://doi.org/10.1109/apccas.2016.7803938","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2016 IEEE Asia Pacific Conference on Circuits and Systems (APCCAS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.41999998688697815,"display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":13,"referenced_works":["https://openalex.org/W92803968","https://openalex.org/W596572879","https://openalex.org/W1548096828","https://openalex.org/W1992008051","https://openalex.org/W2023450006","https://openalex.org/W2023581518","https://openalex.org/W2035938201","https://openalex.org/W2051154329","https://openalex.org/W2061625389","https://openalex.org/W2141624968","https://openalex.org/W2142537526","https://openalex.org/W2151102355","https://openalex.org/W6681113282"],"related_works":["https://openalex.org/W2950447949","https://openalex.org/W2296485668","https://openalex.org/W2391794278","https://openalex.org/W2720693022","https://openalex.org/W2777885722","https://openalex.org/W2132652565","https://openalex.org/W1784733384","https://openalex.org/W571790067","https://openalex.org/W1604791554","https://openalex.org/W2615464719"],"abstract_inverted_index":{"Scan-path":[0],"test,":[1],"which":[2,48,138],"is":[3,46,148],"one":[4,75],"of":[5,76],"design-for-test":[6],"techniques":[7],"using":[8,38,83],"a":[9,39,67,72,151,155],"scan":[10,40,56],"chain,":[11],"can":[12,24,49,111],"control":[13],"and":[14,80,98],"observe":[15],"internal":[16],"registers":[17],"in":[18,117],"an":[19,43],"LSI":[20,44],"chip.":[21],"However,":[22],"attackers":[23],"also":[25],"use":[26],"it":[27,82],"to":[28],"retrieve":[29],"secret":[30,51,115],"information":[31,52,116],"from":[32],"cipher":[33,93,136,147],"circuits.":[34],"Recently,":[35],"scan-based":[36,68,101,109,142],"attacks":[37],"chain":[41],"inside":[42],"chip":[45,97,120,128],"reported":[47],"restore":[50,113],"by":[53],"analyzing":[54],"the":[55,84,91,95,100,108,114,118,126,134,141,145],"data":[57],"during":[58],"cryptographic":[59],"processing.":[60],"In":[61],"this":[62],"paper,":[63],"we":[64],"pick":[65],"up":[66],"attack":[69,102,110,143],"method":[70],"against":[71,103,144],"Trivium":[73,92,135,146],"cipher,":[74],"synchronous":[77],"stream":[78],"ciphers,":[79],"evaluate":[81],"FPGA":[85,96,119,127],"platform":[86],"called":[87],"SASEBO-GII.":[88],"We":[89,105],"implement":[90],"on":[94],"perform":[99],"it.":[104],"demonstrate":[106],"that":[107,140],"successfully":[112],"within":[121],"several":[122,130],"minutes,":[123],"even":[124],"if":[125],"contains":[129],"circuits":[131],"other":[132],"than":[133],"circuit,":[137],"reveals":[139],"not":[149],"only":[150],"simulation":[152],"threat":[153],"but":[154],"real":[156],"threat.":[157]},"counts_by_year":[{"year":2022,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
