{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,10]],"date-time":"2026-01-10T00:31:16Z","timestamp":1768005076060,"version":"3.49.0"},"reference-count":19,"publisher":"Association for Computing Machinery (ACM)","issue":"2","license":[{"start":{"date-parts":[[2011,3,1]],"date-time":"2011-03-01T00:00:00Z","timestamp":1298937600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["6.22E+12"],"award-info":[{"award-number":["6.22E+12"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Des. Autom. Electron. Syst."],"published-print":{"date-parts":[[2011,3]]},"abstract":"<jats:p>Stream cipher is an important class of encryption algorithm that encrypts plaintext messages one bit at a time. Various stream ciphers are deployed in wireless telecommunication applications because they have simple hardware circuitry, are generally fast and consume very low power. On the other hand, scan-based Design-for-Test (DFT) is one of the most popular methods to test IC devices. All flip-flops in the Design Under Test are connected to one or more scan chains and the states of the flip-flops can be scanned out through these chains. In this paper, we present an attack on stream cipher implementations by determining the scan chain structure of the Linear Feedback Shift Registers in their implementations. Although scan-based DFT is a powerful testing scheme, we show that it can be used to retrieve the information stored in a crypto chip thus compromising its theoretically proven security.<\/jats:p>","DOI":"10.1145\/1929943.1929952","type":"journal-article","created":{"date-parts":[[2011,4,6]],"date-time":"2011-04-06T16:08:07Z","timestamp":1302106087000},"page":"1-15","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":35,"title":["Scan-based attacks on linear feedback shift register based stream ciphers"],"prefix":"10.1145","volume":"16","author":[{"given":"Yu","family":"Liu","sequence":"first","affiliation":[{"name":"University of Illinois at Chicago, IL"}]},{"given":"Kaijie","family":"Wu","sequence":"additional","affiliation":[{"name":"University of Illinois at Chicago, IL"}]},{"given":"Ramesh","family":"Karri","sequence":"additional","affiliation":[{"name":"Polytechnic Institute of New York University, Brooklyn, NY"}]}],"member":"320","published-online":{"date-parts":[[2011,4,7]]},"reference":[{"key":"e_1_2_1_1_1","unstructured":"Berbain C. Billet O. Canteaut A. Courtois N. Debraize B. Gilbert H. Goubin L. Gouget A. Granboulan L. Lauradoux C. Minier M. Pornin T. and Sibert H. DECIM. http:\/\/www.ecrypt.eu.org\/stream\/decimp3.html  Berbain C. Billet O. Canteaut A. Courtois N. Debraize B. Gilbert H. Goubin L. Gouget A. Granboulan L. Lauradoux C. Minier M. Pornin T. and Sibert H. DECIM. http:\/\/www.ecrypt.eu.org\/stream\/decimp3.html"},{"key":"e_1_2_1_2_1","volume-title":"Proceedings of the 7th Australian Conference on Information Security and Privacy. 25--39","author":"Clark A."},{"key":"e_1_2_1_3_1","volume-title":"Proceedings of the European Signal Processing Conference.","author":"Erguler I."},{"key":"e_1_2_1_4_1","unstructured":"Goering R. 2004. Scan design called portal for hackers EE Times. http:\/\/www.eetimes.com\/news\/latest\/showArticle.jhtml?articleID=51200146  Goering R. 2004. Scan design called portal for hackers EE Times. http:\/\/www.eetimes.com\/news\/latest\/showArticle.jhtml?articleID=51200146"},{"key":"e_1_2_1_5_1","unstructured":"Gurkaynak F. K. Luethi P. Bernold N. Blattmann R. Goode V. Marghitola M. Kaeslin H. Felber N. and Fichtner W. Hardware evaluation of eSTREAM candidates: Achterbahn Grain MICKEY MOSQUITO SFINKS Trivium VEST ZK-Crypt. http:\/\/www.ecrypt.eu.org\/stream\/.  Gurkaynak F. K. Luethi P. Bernold N. Blattmann R. Goode V. Marghitola M. Kaeslin H. Felber N. and Fichtner W. Hardware evaluation of eSTREAM candidates: Achterbahn Grain MICKEY MOSQUITO SFINKS Trivium VEST ZK-Crypt. http:\/\/www.ecrypt.eu.org\/stream\/."},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.5555\/1009387.1010299"},{"key":"e_1_2_1_7_1","unstructured":"Jansen C. J. A. 2004. Stream cipher design: Make your LFSRs jump&amp;excl; In Proceedings of the Workshop of the State of the Art of Stream Ciphers. 94--108.  Jansen C. J. A. 2004. Stream cipher design: Make your LFSRs jump&amp;excl; In Proceedings of the Workshop of the State of the Art of Stream Ciphers. 94--108."},{"key":"e_1_2_1_8_1","unstructured":"Jansen C. J. A. Helleseth T. and Kholosha A. Cascade jump controlled sequence generator and Pomaranch stream cipher. http:\/\/www.ecrypt.eu.org\/stream\/pomaranchp3.html.  Jansen C. J. A. Helleseth T. and Kholosha A. Cascade jump controlled sequence generator and Pomaranch stream cipher. http:\/\/www.ecrypt.eu.org\/stream\/pomaranchp3.html."},{"key":"e_1_2_1_9_1","volume-title":"Proceedings of the IEEE International Test Conference. 451--460","author":"Josephson D."},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/DFTVS.2005.58"},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/VTS.2006.7"},{"key":"e_1_2_1_12_1","unstructured":"Menezes A. Van Oorschot P. and Vanstone S. 1996. Handbook of Applied Cryptography. CRC Press.   Menezes A. Van Oorschot P. and Vanstone S. 1996. Handbook of Applied Cryptography. CRC Press."},{"key":"e_1_2_1_13_1","unstructured":"Mills E. 2008. D-Day for RFID-based transit card systems. CNET News. http:\/\/news.cnet.com\/8301-1009_3-10059605-83.html?tag=mncol;title  Mills E. 2008. D-Day for RFID-based transit card systems. CNET News. http:\/\/news.cnet.com\/8301-1009_3-10059605-83.html?tag=mncol;title"},{"key":"e_1_2_1_14_1","unstructured":"Nohl K. and Plotz H. 2007. Mifare -- Little security despite obscurity. http:\/\/events.ccc.de\/congress\/2007\/Fahrplan\/events\/2378.en.html  Nohl K. and Plotz H. 2007. Mifare -- Little security despite obscurity. http:\/\/events.ccc.de\/congress\/2007\/Fahrplan\/events\/2378.en.html"},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.1985.1676518"},{"key":"e_1_2_1_16_1","unstructured":"Thomas S. Anthony D. Berson T. and Gong G. 2002. The W7 stream cipher algorithm. Internet Draft.  Thomas S. Anthony D. Berson T. and Gong G. 2002. The W7 stream cipher algorithm. Internet Draft."},{"key":"e_1_2_1_17_1","volume-title":"Proceedings of the 2nd International Confernce on Security in Pervasive Computing.","author":"Weis S. A."},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1065579.1065617"},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2005.862745"}],"container-title":["ACM Transactions on Design Automation of Electronic Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1929943.1929952","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1929943.1929952","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T20:26:32Z","timestamp":1750278392000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1929943.1929952"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,3]]},"references-count":19,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2011,3]]}},"alternative-id":["10.1145\/1929943.1929952"],"URL":"https:\/\/doi.org\/10.1145\/1929943.1929952","relation":{},"ISSN":["1084-4309","1557-7309"],"issn-type":[{"value":"1084-4309","type":"print"},{"value":"1557-7309","type":"electronic"}],"subject":[],"published":{"date-parts":[[2011,3]]},"assertion":[{"value":"2008-11-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2010-08-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2011-04-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}