{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,28]],"date-time":"2026-03-28T08:15:24Z","timestamp":1774685724459,"version":"3.50.1"},"reference-count":13,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2014,7,1]],"date-time":"2014-07-01T00:00:00Z","timestamp":1404172800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J. Comput. Sci. Technol."],"published-print":{"date-parts":[[2014,7]]},"DOI":"10.1007\/s11390-014-1456-3","type":"journal-article","created":{"date-parts":[[2014,7,14]],"date-time":"2014-07-14T08:24:41Z","timestamp":1405326281000},"page":"646-655","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Scan-Based Attack on Stream Ciphers: A Case Study on eSTREAM Finalists"],"prefix":"10.1007","volume":"29","author":[{"given":"Min-Hui","family":"Zou","sequence":"first","affiliation":[]},{"given":"Kun","family":"Ma","sequence":"additional","affiliation":[]},{"given":"Kai-Jie","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Edwin Hsing-Mean","family":"Sha","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,7,4]]},"reference":[{"key":"1456_CR1","doi-asserted-by":"crossref","unstructured":"H\u00e9ly D, Flottes M L, Bancel F et al. Scan design and secure chip. In Proc. the 10th IEEE International On-Line Testing Symposium, Jul. 2004, pp.219-226.","DOI":"10.1109\/OLT.2004.1319691"},{"key":"1456_CR2","doi-asserted-by":"crossref","unstructured":"Josephson D D, Poehhnan S, Govan V. Debug methodology for the McKinley processor. InProc. the International Test Conference, Nov. 2001, pp.451-460.","DOI":"10.1109\/TEST.2001.966662"},{"key":"1456_CR3","doi-asserted-by":"crossref","unstructured":"Skorobogatov S P, Anderson R J. Optical fault induction attacks. In Lecture Notes in Computer Science 2523, Kaliski B S, Ko\u00e7 C K, Paar C (eds.), Springer-Verlag Berlin Heidelberg, 2002, pp.2-12.","DOI":"10.1007\/3-540-36400-5_2"},{"issue":"10","key":"1456_CR4","doi-asserted-by":"crossref","first-page":"2287","DOI":"10.1109\/TCAD.2005.862745","volume":"25","author":"B Yang","year":"2006","unstructured":"Yang B, Wu K, Karri R. Secure scan: A design-for-test architecture for crypto chips. IEEE Trans. Computer-Aided Design of Integrated Circuits and Systems, 2006, 25(10): 2287-2293.","journal-title":"IEEE Trans. Computer-Aided Design of Integrated Circuits and Systems"},{"key":"1456_CR5","doi-asserted-by":"crossref","unstructured":"Kamal A A, Youssef A M. A scan-based side channel attack on the NTRUEncrypt cryptosystem. In Proc. the 7th International Conference on Availability, Reliability and Security, Aug. 2012, pp.402-409.","DOI":"10.1109\/ARES.2012.14"},{"key":"1456_CR6","unstructured":"Salehani Y E. Side channel attacks on symmetric key primitives [Master Thesis]. Concordia University, 2011. http:\/\/spectrum.library.concordia.ca\/7765\/1\/EsmaeiliSalehani MA-Sc F2011.pdf, May 2014."},{"issue":"9","key":"1456_CR7","doi-asserted-by":"crossref","first-page":"2223","DOI":"10.1016\/j.comnet.2007.01.008","volume":"51","author":"B Preneel","year":"2007","unstructured":"Preneel B. A survey of recent developments in cryptographic algorithms for smart cards. Computer Networks, 2007, 51(9): 2223-2233.","journal-title":"Computer Networks"},{"key":"1456_CR8","doi-asserted-by":"crossref","unstructured":"Canteaut A. Open problems related to algebraic attacks on stream ciphers. In Lecture Notes in Computer Science 3969, Ytrehus \u2205(ed.), Springer Berlin Heidelberg, pp.120-134.","DOI":"10.1007\/11779360_10"},{"issue":"1","key":"1456_CR9","doi-asserted-by":"crossref","first-page":"86","DOI":"10.1504\/IJWMC.2007.013798","volume":"2","author":"M Hell","year":"2007","unstructured":"Hell M, Johansson T, Meier W. Grain: A stream cipher for constrained environments. International Journal of Wireless and Mobile Computing, 2007, 2(1): 86-93.","journal-title":"International Journal of Wireless and Mobile Computing"},{"key":"1456_CR10","doi-asserted-by":"crossref","unstructured":"Liu Y, Wu K, Karri R. Scan-based attacks on linear feedback shift register based stream ciphers. ACM Trans. Design Automation of Electronic Systems, 2011, 16(2), Article No.20.","DOI":"10.1145\/1929943.1929952"},{"key":"1456_CR11","doi-asserted-by":"crossref","unstructured":"Mukhopadhyay D, Banerjee S, Roychowdhury D et al. CryptoScan: A secured scan chain architecture. In Proc. the 14th Asian Test Sysmposium, Dec. 2005, pp.348-353.","DOI":"10.1109\/ATS.2005.42"},{"key":"1456_CR12","doi-asserted-by":"crossref","unstructured":"Lee J, Tehranipoor M, Patel C et al. Securing scan design using lock and key technique. In Proc. the 20th IEEE International Symposium on Defect and Fault Tolerance in VLSI Systems, Oct. 2005, pp.51-62.","DOI":"10.1109\/DFTVS.2005.58"},{"key":"1456_CR13","doi-asserted-by":"crossref","unstructured":"Lee J, Tehranipoor M, Plusquellic J. A low-cost solution for protecting IPs against scan-based side-channel attacks. InProc. the 24th IEEE VLSI Test Symposium, April 30-May 4, 2006, pp.94-99.","DOI":"10.1109\/VTS.2006.7"}],"container-title":["Journal of Computer Science and Technology"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11390-014-1456-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11390-014-1456-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11390-014-1456-3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,3]],"date-time":"2025-05-03T19:53:52Z","timestamp":1746302032000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11390-014-1456-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,7]]},"references-count":13,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2014,7]]}},"alternative-id":["1456"],"URL":"https:\/\/doi.org\/10.1007\/s11390-014-1456-3","relation":{},"ISSN":["1000-9000","1860-4749"],"issn-type":[{"value":"1000-9000","type":"print"},{"value":"1860-4749","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,7]]}}}