{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,19]],"date-time":"2026-03-19T22:31:09Z","timestamp":1773959469047,"version":"3.50.1"},"reference-count":43,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Journal of Information Security and Applications"],"published-print":{"date-parts":[[2026,6]]},"DOI":"10.1016\/j.jisa.2026.104442","type":"journal-article","created":{"date-parts":[[2026,3,19]],"date-time":"2026-03-19T13:06:40Z","timestamp":1773925600000},"page":"104442","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":0,"special_numbering":"C","title":["Round key attack: Exploiting AES round key generation reversibility through scan analysis"],"prefix":"10.1016","volume":"99","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2357-6382","authenticated-orcid":false,"given":"Gaurav","family":"Kumar","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0000-9145-8938","authenticated-orcid":false,"given":"Pardeep","family":"Kumar","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3709-7956","authenticated-orcid":false,"given":"Yamuna","family":"Prasad","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0186-1446","authenticated-orcid":false,"given":"Satyadev","family":"Ahlawat","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.jisa.2026.104442_bib0001","series-title":"Cryptographic hardware and embedded systems - CHES 2007","isbn-type":"print","doi-asserted-by":"crossref","first-page":"450","DOI":"10.1007\/978-3-540-74735-2_31","article-title":"Present: an ultra-lightweight block cipher","author":"Bogdanov","year":"2007","ISBN":"https:\/\/id.crossref.org\/isbn\/9783540747352"},{"key":"10.1016\/j.jisa.2026.104442_bib0002","series-title":"Essentials of Electronic Testing for Digital, Memory, and Mixed-Signal VLSI Circuits","author":"Bushnell","year":"2005"},{"key":"10.1016\/j.jisa.2026.104442_bib0003","series-title":"2016 8th IEEE international conference on communication software and networks (ICCSN)","first-page":"8","article-title":"Differential power analysis attack and efficient countermeasures on PRESENT","author":"Duan","year":"2016"},{"key":"10.1016\/j.jisa.2026.104442_bib0004","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1007\/s13389-011-0006-y","article-title":"Introduction to differential power analysis","volume":"1","author":"Kocher","year":"2011","journal-title":"J. Cryptogr. Eng."},{"key":"10.1016\/j.jisa.2026.104442_bib0005","series-title":"Cryptographic hardware and embedded systems \u2014 CHES 2001","isbn-type":"print","doi-asserted-by":"crossref","first-page":"251","DOI":"10.1007\/3-540-44709-1_21","article-title":"Electromagnetic analysis: concrete results","author":"Gandolfi","year":"2001","ISBN":"https:\/\/id.crossref.org\/isbn\/9783540447092"},{"key":"10.1016\/j.jisa.2026.104442_bib0006","series-title":"Companion proceedings for the ISSTA\/ECOOP 2018 workshops","isbn-type":"print","doi-asserted-by":"crossref","first-page":"138","DOI":"10.1145\/3236454.3236512","article-title":"Electromagnetic side-channel attacks: potential for progressing hindered digital forensic analysis","author":"Sayakkara","year":"2018","ISBN":"https:\/\/id.crossref.org\/isbn\/9781450359399"},{"key":"10.1016\/j.jisa.2026.104442_bib0007","series-title":"2004 International conferce on test","first-page":"339","article-title":"Scan based side channel attack on dedicated hardware implementations of data encryption standard","author":"Yang","year":"2004"},{"key":"10.1016\/j.jisa.2026.104442_bib0008","unstructured":"Dworkin M., Barker E., Nechvatal J., Foti J., Bassham L., Roback E., et al. Advanced encryption standard (AES). 2001. 10.6028\/NIST.FIPS.197."},{"issue":"10","key":"10.1016\/j.jisa.2026.104442_bib0009","doi-asserted-by":"crossref","first-page":"2287","DOI":"10.1109\/TCAD.2005.862745","article-title":"Secure scan: a design-for-test architecture for crypto chips","volume":"25","author":"Yang","year":"2006","journal-title":"IEEE Trans. Comput. Aided Des. Integr. Circuits Syst."},{"key":"10.1016\/j.jisa.2026.104442_bib0010","series-title":"Design automation conference (ASP-DAC), 2010 15th asia and south pacific","first-page":"407","article-title":"Scan-based attack against elliptic curve cryptosystems","author":"Nara","year":"2010"},{"key":"10.1016\/j.jisa.2026.104442_bib0011","series-title":"2012 IEEE 30th VLSI test symposium (VTS)","first-page":"246","article-title":"Are advanced dft structures sufficient for preventing scan-attacks?","author":"Da Rolt","year":"2012"},{"key":"10.1016\/j.jisa.2026.104442_bib0012","series-title":"2011 IEEE International symposium on hardware-oriented security and trust","article-title":"New security threats against chips containing scan chain structures","author":"Da Rolt","year":"2011"},{"key":"10.1016\/j.jisa.2026.104442_bib0013","series-title":"European test symposium (ETS\u201905)","first-page":"190","article-title":"Test control for secure scan designs","author":"Hely","year":"2005"},{"key":"10.1016\/j.jisa.2026.104442_bib0014","series-title":"2013 IFIP\/IEEE 21st international conference on very large scale integration (VLSI-Soc)","first-page":"234","article-title":"New scan-based attack using only the test mode","author":"Ali","year":"2013"},{"key":"10.1016\/j.jisa.2026.104442_bib0015","series-title":"2019 IEEE 25Th international symposium on on-Line testing and robust system design (IOLTS)","first-page":"251","article-title":"Securing scan through plain-text restriction","author":"Ahlawat","year":"2019"},{"issue":"12","key":"10.1016\/j.jisa.2026.104442_bib0016","doi-asserted-by":"crossref","first-page":"4524","DOI":"10.1109\/TCAD.2020.2979458","article-title":"A guaranteed secure scan design based on test data obfuscation by cryptographic hash","volume":"39","author":"Cui","year":"2020","journal-title":"IEEE Trans. Comput. Aided Des. Integr. Circuits Syst."},{"key":"10.1016\/j.jisa.2026.104442_bib0017","series-title":"2019 IEEE International symposium on defect and fault tolerance in VLSI and nanotechnology systems (DFT)","first-page":"1","article-title":"Preventing scan attack through test response encryption","author":"Ahlawat","year":"2019"},{"issue":"9","key":"10.1016\/j.jisa.2026.104442_bib0018","doi-asserted-by":"crossref","first-page":"1867","DOI":"10.1109\/TCAD.2017.2772817","article-title":"Secure scan and test using obfuscation throughout supply chain","volume":"37","author":"Wang","year":"2018","journal-title":"IEEE Trans. Comput. Aided Des. Integr. Circuits Syst."},{"key":"10.1016\/j.jisa.2026.104442_bib0019","doi-asserted-by":"crossref","DOI":"10.1109\/TCAD.2024.3368289","article-title":"Defscan: provably defeating scan attack on AES-like ciphers","author":"Sao","year":"2024","journal-title":"IEEE Trans. Comput. Aided Des. Integr. Circuits Syst."},{"key":"10.1016\/j.jisa.2026.104442_bib0020","series-title":"2020 IEEE 29th asian test symposium (ATS)","first-page":"1","article-title":"An effective technique preventing differential cryptanalysis attack","author":"Wang","year":"2020"},{"key":"10.1016\/j.jisa.2026.104442_bib0021","series-title":"2020 IEEE 33Rd international system-on-chip conference (SOCC)","first-page":"135","article-title":"Mist-scan: a secure scan chain architecture to resist scan-based attacks in cryptographic chips","author":"Taherifard","year":"2020"},{"key":"10.1016\/j.jisa.2026.104442_bib0022","series-title":"25th IEEE VLSI test symposium (VTS\u201907)","first-page":"455","article-title":"Vim-scan: a low overhead scan design approach for protection of secret key in scan-based secure chips","author":"Paul","year":"2007"},{"key":"10.1016\/j.jisa.2026.104442_bib0023","series-title":"2022 IEEE 31st asian test symposium (ATS)","first-page":"19","article-title":"An obfuscation scheme of scan chain to protect the cryptographic chips","author":"Huang","year":"2022"},{"issue":"2","key":"10.1016\/j.jisa.2026.104442_bib0024","doi-asserted-by":"crossref","first-page":"363","DOI":"10.1109\/TIFS.2016.2613847","article-title":"Static and dynamic obfuscations of scan data against scan-based side-channel attacks","volume":"12","author":"Cui","year":"2017","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"10.1016\/j.jisa.2026.104442_bib0025","series-title":"2009 27th IEEE VLSI test symposium","first-page":"321","article-title":"SS-KTC: A high-testability low-overhead scan architecture with multi-level security integration","author":"Chandran","year":"2009"},{"key":"10.1016\/j.jisa.2026.104442_bib0026","series-title":"Test symposium (ATS), 2011 20th Asian","first-page":"60","article-title":"SSTKR: Secure and testable scan design through test key randomization","author":"Razzaq","year":"2011"},{"issue":"4","key":"10.1016\/j.jisa.2026.104442_bib0027","doi-asserted-by":"crossref","first-page":"325","DOI":"10.1109\/TDSC.2007.70215","article-title":"Securing designs against scan-based side-channel attacks","volume":"4","author":"Lee","year":"2007","journal-title":"IEEE Trans. Depend. Secure Comput."},{"key":"10.1016\/j.jisa.2026.104442_bib0028","series-title":"2020 Design, automation & test in Europe conference & exhibition (DATE)","first-page":"270","article-title":"Dynunlock: unlocking scan chains obfuscated using dynamic keys","author":"Limaye","year":"2020"},{"key":"10.1016\/j.jisa.2026.104442_bib0029","series-title":"2019 24th asia and south pacific design automation conference (ASP-DAC)","first-page":"1","article-title":"ScanSAT: unlocking obfuscated scan chains","author":"Alrahis","year":"2019"},{"issue":"12","key":"10.1016\/j.jisa.2026.104442_bib0030","doi-asserted-by":"crossref","first-page":"2338","DOI":"10.1587\/transfun.E95.A.2338","article-title":"Scan-based attack on AES through round registers and its countermeasure","volume":"95-A","author":"Shi","year":"2012","journal-title":"IEICE Trans. Fundam. Electron. Commun. Comput. Sci."},{"key":"10.1016\/j.jisa.2026.104442_bib0031","series-title":"2011 IEEE International symposium on hardware-oriented security and trust","article-title":"New security threats against chips containing scan chain structures","author":"Da Rolt","year":"2011"},{"key":"10.1016\/j.jisa.2026.104442_bib0032","first-page":"1","article-title":"IEEE Standard for test access port and boundary-scan architecture","author":"Association","year":"2013","journal-title":"IEEE Std 11491-2013 (Revision of IEEE Std 11491-2001)"},{"key":"10.1016\/j.jisa.2026.104442_bib0033","series-title":"2017 IEEE International symposium on defect and fault tolerance in VLSI and nanotechnology systems (DFT)","first-page":"1","article-title":"Preventing scan-based side-channel attacks through key masking","author":"Ahlawat","year":"2017"},{"issue":"1","key":"10.1016\/j.jisa.2026.104442_bib0034","doi-asserted-by":"crossref","first-page":"50","DOI":"10.1109\/TETC.2014.2304492","article-title":"Test versus security: past and present","volume":"2","author":"Da Rolt","year":"2014","journal-title":"IEEE Trans. Emerg. Top. Comput."},{"issue":"1","key":"10.1016\/j.jisa.2026.104442_bib0035","doi-asserted-by":"crossref","first-page":"126","DOI":"10.1109\/TVLSI.2010.2089071","article-title":"A secure test wrapper design against internal and boundary scan attacks for embedded cores","volume":"20","author":"Chiu","year":"2012","journal-title":"IEEE Trans. Very Large Scale Integr. VLSI Syst."},{"key":"10.1016\/j.jisa.2026.104442_bib0036","doi-asserted-by":"crossref","DOI":"10.1016\/j.microrel.2021.114216","article-title":"Co-relation scan attack analysis (COSAA) on AES: a comprehensive approach","volume":"123","author":"Sao","year":"2021","journal-title":"Microelectron. Reliab."},{"issue":"12","key":"10.1016\/j.jisa.2026.104442_bib0037","doi-asserted-by":"crossref","first-page":"1966","DOI":"10.1109\/TCAD.2013.2274619","article-title":"Security analysis of industrial test compression schemes","volume":"32","author":"Das","year":"2013","journal-title":"Trans. Comp.-Aided Des. Integ. Cir. Sys."},{"key":"10.1016\/j.jisa.2026.104442_bib0038","series-title":"2014 19th IEEE European test symposium (ETS)","first-page":"1","article-title":"Test-mode-only scan attack using the boundary scan chain","author":"Ali","year":"2014"},{"issue":"5","key":"10.1016\/j.jisa.2026.104442_bib0039","doi-asserted-by":"crossref","first-page":"808","DOI":"10.1109\/TCAD.2015.2398423","article-title":"Novel test-mode-only scan attack and countermeasure for compression-based scan architectures","volume":"34","author":"Ali","year":"2015","journal-title":"IEEE Trans. Comput. Aided Des. Integr. Circuits Syst."},{"key":"10.1016\/j.jisa.2026.104442_bib0040","series-title":"Tech. Rep.","article-title":"Amd memory encryption","author":"Kaplan","year":"2021"},{"key":"10.1016\/j.jisa.2026.104442_bib0041","series-title":"Test symposium (ETS), 2011 16th IEEE European","first-page":"19","article-title":"Scan attacks and countermeasures in presence of scan response compactors","author":"Da Rolt","year":"2011"},{"key":"10.1016\/j.jisa.2026.104442_bib0042","doi-asserted-by":"crossref","first-page":"2842","DOI":"10.1109\/TIFS.2023.3265815","article-title":"Security analysis of scan obfuscation techniques","volume":"18","author":"Sao","year":"2023","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"10.1016\/j.jisa.2026.104442_bib0043","unstructured":"OpenCores. AES (Rijndael) IP Core. https:\/\/opencores.org\/projects\/aes_core; 2024. Accessed: 2024-08-27."}],"container-title":["Journal of Information Security and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S2214212626000724?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S2214212626000724?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2026,3,19]],"date-time":"2026-03-19T19:06:35Z","timestamp":1773947195000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S2214212626000724"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,6]]},"references-count":43,"alternative-id":["S2214212626000724"],"URL":"https:\/\/doi.org\/10.1016\/j.jisa.2026.104442","relation":{},"ISSN":["2214-2126"],"issn-type":[{"value":"2214-2126","type":"print"}],"subject":[],"published":{"date-parts":[[2026,6]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Round key attack: Exploiting AES round key generation reversibility through scan analysis","name":"articletitle","label":"Article Title"},{"value":"Journal of Information Security and Applications","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.jisa.2026.104442","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2026 Elsevier Ltd. All rights are reserved, including those for text and data mining, AI training, and similar technologies.","name":"copyright","label":"Copyright"}],"article-number":"104442"}}