{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,4]],"date-time":"2025-11-04T10:25:32Z","timestamp":1762251932054},"reference-count":32,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2013,3,24]],"date-time":"2013-03-24T00:00:00Z","timestamp":1364083200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["J Electron Test"],"published-print":{"date-parts":[[2013,4]]},"DOI":"10.1007\/s10836-013-5369-9","type":"journal-article","created":{"date-parts":[[2013,3,23]],"date-time":"2013-03-23T06:13:56Z","timestamp":1364019236000},"page":"193-209","source":"Crossref","is-referenced-by-count":29,"title":["Secure JTAG Implementation Using Schnorr Protocol"],"prefix":"10.1007","volume":"29","author":[{"given":"Amitabh","family":"Das","sequence":"first","affiliation":[]},{"given":"Jean","family":"Da Rolt","sequence":"additional","affiliation":[]},{"given":"Santosh","family":"Ghosh","sequence":"additional","affiliation":[]},{"given":"Stefaan","family":"Seys","sequence":"additional","affiliation":[]},{"given":"Sophie","family":"Dupuis","sequence":"additional","affiliation":[]},{"given":"Giorgio","family":"Di Natale","sequence":"additional","affiliation":[]},{"given":"Marie-Lise","family":"Flottes","sequence":"additional","affiliation":[]},{"given":"Bruno","family":"Rouzeyre","sequence":"additional","affiliation":[]},{"given":"Ingrid","family":"Verbauwhede","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2013,3,24]]},"reference":[{"key":"5369_CR1","unstructured":"Batina L, Guajardo J, Kerins T, Mentens N, Tuyls P, Verbauwhede I (2006) An Elliptic Curve Processor Suitable For RFID-Tags. IACR Cryptology ePrint Archive"},{"key":"5369_CR2","unstructured":"Batina L, Guajardo J, Kerins T, Mentens N, Tuyls P and Verbauwhede I (2006) Public-Key Cryptography for RFID-Tags. Workshop on RFID Security, pp. 61\u201376"},{"key":"5369_CR3","doi-asserted-by":"crossref","unstructured":"Becher A, Benenson Z and Dornseif M (2006) Tampering with Motes: Real-World Physical Attacks on Wireless Sensor Networks. SPC 2006, LNCS 3934, pp. 104\u2013118","DOI":"10.1007\/11734666_9"},{"key":"5369_CR4","doi-asserted-by":"crossref","unstructured":"Bernstein DJ and Lange T (2007) Faster addition and doubling on elliptic curves. ASIACRYPT 2007. LNCS 4833, pp. 29\u201350, Springer","DOI":"10.1007\/978-3-540-76900-2_3"},{"key":"5369_CR5","unstructured":"Buskey RF and Frosik BB. Protected JTAG, Proceedings of the 2006 International Conference on Parallel Processing Workshops (ICPPW\u201906), 0-7695-2637-3\/06"},{"key":"5369_CR6","doi-asserted-by":"crossref","unstructured":"Clark CJ (2010) Anti-tamper JTAG TAP design enables DRM to JTAG registers and P1687 on-chip instruments. IEEE Symposium on Hardware-Oriented Security and Trust (HOST)","DOI":"10.1109\/HST.2010.5513119"},{"key":"5369_CR7","doi-asserted-by":"crossref","unstructured":"Cohen H, Miyaji A and Ono T (1998) Efficient elliptic curve exponentiation using mixed coordinates. ASIACRYPT '98. LNCS 1514, pp. 51\u201365","DOI":"10.1007\/3-540-49649-1_6"},{"key":"5369_CR8","unstructured":"Explicit Formula Database http:\/\/www.hyperelliptic.org\/EFD\/g1p\/auto-shortw.html"},{"key":"5369_CR9","doi-asserted-by":"crossref","unstructured":"Ghosh S, Mukhopadhyay D and Roychowdhury D (2011) Petrel: power and timing attack resistant elliptic curve scalar multiplier based on programmable arithmetic unit. IEEE Transactions on Circuits and Systems I, Vol 58, No. 11, pp. 1798\u20131812","DOI":"10.1109\/TCSI.2010.2103190"},{"key":"5369_CR10","unstructured":"Greenemeier L (August 30, 2007) iPhone Hacks Annoy AT&T but Are Unlikely to Bruise Apple. Scientific American"},{"key":"5369_CR11","unstructured":"Guide to Understanding JTAG Fuses and Security: An Intermediate Look at the AVR JTAG Interface. AVRFreaks.net, Sept 2002"},{"key":"5369_CR12","unstructured":"Hankerson D, Menezes A and Vanstone S. Guide to Elliptic Curve Cryptography, pp. 262, Sample parameters"},{"key":"5369_CR13","unstructured":"Hartung C, Balasalle J and Han R (2005) Node Compromise in Sensor Networks: The Need for Secure Systems. Technical Report CU-CS-990-05, Dept of Computer Science, Univ of Colorado at Boulder"},{"key":"5369_CR14","unstructured":"IEEE P1687 and In-Circuit Test (ICT). Asset Intertech article, June 2011"},{"key":"5369_CR15","unstructured":"IEEE Standard. 1149.1-1990 - IEEE Standard Test Access Port and Boundary-Scan Architecture, 1990"},{"key":"5369_CR16","doi-asserted-by":"crossref","first-page":"171","DOI":"10.1016\/0890-5401(88)90024-7","volume":"78","author":"T Itoh","year":"1988","unstructured":"Itoh T, Tsujii S (1988) A fast algorithm for computing multiplicative inverses in GF(2m) using normal bases. Inf Comput 78:171\u2013177","journal-title":"Inf Comput"},{"key":"5369_CR17","doi-asserted-by":"crossref","unstructured":"Jovan Dj. Golic, \u201cNew Methods for Digital Generation and Postprocessing of Random Data\u201d, IEEE Transactions on Computers, Vol. 55, No. 10, October 2006","DOI":"10.1109\/TC.2006.164"},{"key":"5369_CR18","doi-asserted-by":"crossref","unstructured":"Kern T and Feldhofer M (2010) Low-Resource ECDSA Implementation for Passive RFID Tags, ICECS","DOI":"10.1109\/ICECS.2010.5724742"},{"key":"5369_CR19","doi-asserted-by":"crossref","unstructured":"Mahmut Yilmaz and Krishnendu Chakrabarty, \u201cSeed Selection in LFSR-Reseeding-Based Test Compression for the Detection of Small-Delay Defects\u201d, DATE 2009","DOI":"10.1109\/DATE.2009.5090898"},{"issue":"11","key":"5369_CR20","doi-asserted-by":"crossref","first-page":"1514","DOI":"10.1109\/TC.2008.148","volume":"57","author":"YK Lee","year":"2008","unstructured":"Lee YK, Sakiyama K, Batina L, Verbauwhede I (2008) Elliptic-curve-based security processor for RFID. IEEE Trans Comput 57(11):1514\u20131527","journal-title":"IEEE Trans Comput"},{"key":"5369_CR21","unstructured":"Maestra Comprehensive Test for Satellite Testing V5. www.maestra.ca"},{"key":"5369_CR22","doi-asserted-by":"crossref","unstructured":"Michael Hutter, Martin Feldhofer, Thomas Plos, \u201cAn ECDSA Processor for RFID Authentication\u201d, RFIDSec LNCS 2010, Volume 6370, 2010, pp 189\u2013202","DOI":"10.1007\/978-3-642-16822-2_16"},{"key":"5369_CR23","doi-asserted-by":"crossref","unstructured":"Neophytou S, Michael MK, Tragoudas S \u201cEfficient Deterministic Test Generation for BIST Schemes with LFSR Reseeding\u201d, 12th IEEE International On-Line Testing Symposium, 2006 (IOLTS\u201906)","DOI":"10.1109\/IOLTS.2006.26"},{"key":"5369_CR24","doi-asserted-by":"crossref","first-page":"301","DOI":"10.1007\/s10836-006-7720-x","volume":"22","author":"F Novak","year":"2006","unstructured":"Novak F, Biasizzo A (2006) Security Extension for IEEE Std. 1149.1. J Electron Test Theory Appl 22:301\u2013303","journal-title":"J Electron Test Theory Appl"},{"key":"5369_CR25","doi-asserted-by":"crossref","unstructured":"Park K, Yoo SG, Kim T and Kim J (September 2010) JTAG Security System Based on Credentials. J Electron Test Theory Appl","DOI":"10.1007\/s10836-010-5170-y"},{"key":"5369_CR26","unstructured":"Pierce L and Tragoudas S Multi-level secure JTAG architecture. IOLTS(2011), pp. 208\u2013209"},{"key":"5369_CR27","unstructured":"Rippel E Security Challenges in Embedded Designs. Discretix Technologies Ltd., Design & Reuse article. http:\/\/www.design-reuse.com\/articles\/20671\/security-embedded-design.html"},{"key":"5369_CR28","doi-asserted-by":"crossref","unstructured":"Rosenfeld K and Karri R (2010) Attacks and Defences for JTAG. IEEE Design and Test of Computers","DOI":"10.1109\/MDT.2010.9"},{"key":"5369_CR29","doi-asserted-by":"crossref","unstructured":"Satoh A and Inoue T (2005) \u201cASIC-Hardware-Focused Comparison for Hash Functions MD5, RIPEMD-160, and SHS,\u201d Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC\u201905)","DOI":"10.1109\/ITCC.2005.92"},{"key":"5369_CR30","unstructured":"Schnorr CP (1990) Efficient identification and signatures for smart cards. In G Brassard, ed. Advances in Cryptology \u2013 Crypto '89, pp. 239\u2013252, LNCS 435"},{"key":"5369_CR31","unstructured":"Spartan-3 Generation Configuration User Guide for Extended Spartan-3A, Spartan-3E, and Spartan-3 FPGA Families. UG332 (v1.6) October 26, 2009, pp. 80"},{"key":"5369_CR32","doi-asserted-by":"crossref","unstructured":"Zhanglei Wang, Krishnendu Chakrabarty, and Seongmoon Wang, \u201cIntegrated LFSR Reseeding, Test Access Optimization, and Test Scheduling for Core-Based System-on-Chip\u201d, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, Vol. 28, No. 8, August 2009","DOI":"10.1109\/TCAD.2009.2021731"}],"container-title":["Journal of Electronic Testing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10836-013-5369-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10836-013-5369-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10836-013-5369-9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,11]],"date-time":"2019-07-11T08:25:33Z","timestamp":1562833533000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10836-013-5369-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,3,24]]},"references-count":32,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2013,4]]}},"alternative-id":["5369"],"URL":"https:\/\/doi.org\/10.1007\/s10836-013-5369-9","relation":{},"ISSN":["0923-8174","1573-0727"],"issn-type":[{"value":"0923-8174","type":"print"},{"value":"1573-0727","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,3,24]]}}}