{"id":"https://openalex.org/W2542022920","doi":"https://doi.org/10.1109/vlsi-soc.2014.7004193","title":"AES design space exploration new line for scan attack resiliency","display_name":"AES design space exploration new line for scan attack resiliency","publication_year":2014,"publication_date":"2014-10-01","ids":{"openalex":"https://openalex.org/W2542022920","doi":"https://doi.org/10.1109/vlsi-soc.2014.7004193","mag":"2542022920"},"language":"en","primary_location":{"id":"doi:10.1109/vlsi-soc.2014.7004193","is_oa":false,"landing_page_url":"https://doi.org/10.1109/vlsi-soc.2014.7004193","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2014 22nd International Conference on Very Large Scale Integration (VLSI-SoC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5039350964","display_name":"Sk Subidh Ali","orcid":"https://orcid.org/0000-0001-5942-4455"},"institutions":[{"id":"https://openalex.org/I57206974","display_name":"New York University","ror":"https://ror.org/0190ak572","country_code":"US","type":"education","lineage":["https://openalex.org/I57206974"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Sk Subidh Ali","raw_affiliation_strings":["New York University, Abu Dhabi, NYUAD"],"affiliations":[{"raw_affiliation_string":"New York University, Abu Dhabi, NYUAD","institution_ids":["https://openalex.org/I57206974"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5059987567","display_name":"Ozgur Sinanoglu","orcid":"https://orcid.org/0000-0003-0782-0397"},"institutions":[{"id":"https://openalex.org/I57206974","display_name":"New York University","ror":"https://ror.org/0190ak572","country_code":"US","type":"education","lineage":["https://openalex.org/I57206974"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Ozgur Sinanoglu","raw_affiliation_strings":["New York University, Abu Dhabi, NYUAD"],"affiliations":[{"raw_affiliation_string":"New York University, Abu Dhabi, NYUAD","institution_ids":["https://openalex.org/I57206974"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5059648257","display_name":"Ramesh Karri","orcid":"https://orcid.org/0000-0001-7989-5617"},"institutions":[{"id":"https://openalex.org/I57206974","display_name":"New York University","ror":"https://ror.org/0190ak572","country_code":"US","type":"education","lineage":["https://openalex.org/I57206974"]},{"id":"https://openalex.org/I90965887","display_name":"SUNY Polytechnic Institute","ror":"https://ror.org/000fxgx19","country_code":"US","type":"education","lineage":["https://openalex.org/I90965887"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Ramesh Karri","raw_affiliation_strings":["New York University Polytechnic School of Engineering"],"affiliations":[{"raw_affiliation_string":"New York University Polytechnic School of Engineering","institution_ids":["https://openalex.org/I90965887","https://openalex.org/I57206974"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5039350964"],"corresponding_institution_ids":["https://openalex.org/I57206974"],"apc_list":null,"apc_paid":null,"fwci":1.8389,"has_fulltext":false,"cited_by_count":8,"citation_normalized_percentile":{"value":0.86402342,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":"7275","issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9969000220298767,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/side-channel-attack","display_name":"Side channel attack","score":0.7964150905609131},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.681376576423645},{"id":"https://openalex.org/keywords/chip","display_name":"Chip","score":0.5712014436721802},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.5582778453826904},{"id":"https://openalex.org/keywords/design-for-testing","display_name":"Design for testing","score":0.4897587299346924},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.4335471987724304},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4268261790275574},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.3696359097957611},{"id":"https://openalex.org/keywords/computer-hardware","display_name":"Computer hardware","score":0.3526124954223633},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.17821162939071655},{"id":"https://openalex.org/keywords/reliability-engineering","display_name":"Reliability engineering","score":0.12183639407157898},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.10533609986305237}],"concepts":[{"id":"https://openalex.org/C49289754","wikidata":"https://www.wikidata.org/wiki/Q2267081","display_name":"Side channel attack","level":3,"score":0.7964150905609131},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.681376576423645},{"id":"https://openalex.org/C165005293","wikidata":"https://www.wikidata.org/wiki/Q1074500","display_name":"Chip","level":2,"score":0.5712014436721802},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.5582778453826904},{"id":"https://openalex.org/C190874656","wikidata":"https://www.wikidata.org/wiki/Q5264347","display_name":"Design for testing","level":3,"score":0.4897587299346924},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.4335471987724304},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4268261790275574},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.3696359097957611},{"id":"https://openalex.org/C9390403","wikidata":"https://www.wikidata.org/wiki/Q3966","display_name":"Computer hardware","level":1,"score":0.3526124954223633},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.17821162939071655},{"id":"https://openalex.org/C200601418","wikidata":"https://www.wikidata.org/wiki/Q2193887","display_name":"Reliability engineering","level":1,"score":0.12183639407157898},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.10533609986305237},{"id":"https://openalex.org/C51234621","wikidata":"https://www.wikidata.org/wiki/Q2149495","display_name":"Testability","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/vlsi-soc.2014.7004193","is_oa":false,"landing_page_url":"https://doi.org/10.1109/vlsi-soc.2014.7004193","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2014 22nd International Conference on Very Large Scale Integration (VLSI-SoC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.6499999761581421,"display_name":"Industry, innovation and infrastructure","id":"https://metadata.un.org/sdg/9"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":17,"referenced_works":["https://openalex.org/W11356556","https://openalex.org/W104126654","https://openalex.org/W1544260021","https://openalex.org/W1977457484","https://openalex.org/W1992008051","https://openalex.org/W2030474490","https://openalex.org/W2101863706","https://openalex.org/W2112244944","https://openalex.org/W2130468378","https://openalex.org/W2137298573","https://openalex.org/W2142537526","https://openalex.org/W4232599178","https://openalex.org/W6600452559","https://openalex.org/W6658201360","https://openalex.org/W6677036316","https://openalex.org/W6679267926","https://openalex.org/W6681113282"],"related_works":["https://openalex.org/W3006344745","https://openalex.org/W182679101","https://openalex.org/W2103519941","https://openalex.org/W3180573957","https://openalex.org/W2162805750","https://openalex.org/W2899421907","https://openalex.org/W2329175123","https://openalex.org/W2043669269","https://openalex.org/W1968560271","https://openalex.org/W2081998479"],"abstract_inverted_index":{"Crypto-chips":[0],"are":[1],"vulnerable":[2],"to":[3,20,46,147],"side-channel":[4,11],"attacks.":[5],"Scan":[6],"attack":[7,12,98],"is":[8,89],"one":[9,63],"such":[10],"which":[13],"uses":[14],"the":[15,22,26,29,37,47,51,55,66,72,79,86,93,97,104,121,127],"scan-based":[16],"DFT":[17],"test":[18,48],"infrastructure":[19],"leak":[21],"secret":[23,68],"information":[24],"of":[25,31,54,106,115,123],"crypto-chip.":[27,56],"In":[28,108],"presence":[30],"scan,":[32],"an":[33],"attacker":[34],"can":[35,64],"run":[36],"chip":[38],"in":[39,135],"normal":[40],"mode,":[41,49],"and":[42],"then":[43],"by":[44],"switching":[45],"retrieve":[50,65],"intermediate":[52],"results":[53],"Using":[57],"only":[58],"a":[59],"few":[60],"input-output":[61],"pairs":[62],"entire":[67],"key.":[69],"Almost":[70],"all":[71],"scan":[73,128,148],"attacks":[74],"on":[75,103,120,126],"AES":[76,83],"crypto-chip":[77],"use":[78],"same":[80],"iterative":[81],"128-bit":[82],"design":[84,105,124,142],"where":[85],"round":[87,94],"register":[88],"placed":[90],"exactly":[91],"after":[92],"operation.":[95],"However,":[96],"potency":[99],"may":[100],"vary":[101],"depending":[102],"AES.":[107,116],"this":[109],"work,":[110],"we":[111],"consider":[112,132],"various":[113],"designs":[114],"We":[117,130,138],"shed":[118],"light":[119],"impact":[122],"style":[125],"attack.":[129,149],"also":[131],"response":[133],"compaction":[134],"our":[136],"analysis.":[137],"show":[139],"that":[140],"certain":[141],"decisions":[143],"deliver":[144],"inherent":[145],"resistance":[146]},"counts_by_year":[{"year":2020,"cited_by_count":1},{"year":2018,"cited_by_count":1},{"year":2017,"cited_by_count":2},{"year":2016,"cited_by_count":1},{"year":2015,"cited_by_count":3}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
