The paper discusses the vulnerabilities of cryptographic hardware to various types of attacks, particularly those exploiting design-for-test (DFT) techniques like scan-based attacks. It categorizes attacks into side-channel attacks, fault attacks, and test-infrastructure based attacks, and provides detailed analysis of implementation methods and their consequences. Additionally, the paper examines countermeasures against these attacks, emphasizing the importance of securing hardware that manages sensitive cryptographic information.