{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,10]],"date-time":"2026-01-10T00:12:54Z","timestamp":1768003974063,"version":"3.49.0"},"reference-count":13,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,4]]},"DOI":"10.1109\/vts.2012.6231061","type":"proceedings-article","created":{"date-parts":[[2012,7,19]],"date-time":"2012-07-19T22:33:00Z","timestamp":1342737180000},"page":"246-251","source":"Crossref","is-referenced-by-count":47,"title":["Are advanced DfT structures sufficient for preventing scan-attacks?"],"prefix":"10.1109","author":[{"given":"Jean","family":"Da Rolt","sequence":"first","affiliation":[]},{"given":"Giorgio","family":"Di Natale","sequence":"additional","affiliation":[]},{"given":"Marie-Lise","family":"Flottes","sequence":"additional","affiliation":[]},{"given":"Bruno","family":"Rouzeyre","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"13","year":"0"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2005.844111"},{"key":"12","year":"0"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2010.2089071"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/TEST.2004.1386969"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2005.862745"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/TEST.2002.1041774"},{"key":"7","first-page":"2","article-title":"Signature analysis: A new digital field service method","volume":"28","author":"frohwerk","year":"1977","journal-title":"Hewlett-Packard J"},{"key":"6","first-page":"934","article-title":"Scalable selector architecture for X-tolerant deterministic BIST","author":"wohl","year":"2004","journal-title":"Proceedings 41st Design Automation Conference 2004 DAC"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2011.5955005"},{"key":"4","first-page":"461","article-title":"Effects of Embedded Decompression and Compaction Architectures on Side-Channel Attack Resistance","author":"liu","year":"0","journal-title":"Proc VTS 2007"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/MDT.2007.179"},{"key":"8","year":"0"}],"event":{"name":"2012 IEEE 30th VLSI Test Symposium (VTS)","location":"Maui, HI, USA","start":{"date-parts":[[2012,4,23]]},"end":{"date-parts":[[2012,4,25]]}},"container-title":["2012 IEEE 30th VLSI Test Symposium (VTS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6222548\/6231057\/06231061.pdf?arnumber=6231061","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,21]],"date-time":"2017-03-21T16:15:16Z","timestamp":1490112916000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6231061\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,4]]},"references-count":13,"URL":"https:\/\/doi.org\/10.1109\/vts.2012.6231061","relation":{},"subject":[],"published":{"date-parts":[[2012,4]]}}}