64 results on '"Xiaole Cui"'
Search Results
2. The Security Enhancement Techniques of the Double-layer PUF Against the ANN-based Modeling Attack
- Author
-
Xiaoxin Cui, Wenqiang Ye, Yongliang Chen, and Xiaole Cui
- Subjects
Double layer (biology) ,Materials science ,business.industry ,Optoelectronics ,Security enhancement ,business - Published
- 2021
- Full Text
- View/download PDF
3. An SNN-Based and Neuromorphic-Hardware-Implementable Noise Filter with Self-adaptive Time Window for Event-Based Vision Sensor
- Author
-
Kefei Liu, Xin'an Wang, Kanglin Xiao, Xiaoxin Cui, and Xiaole Cui
- Subjects
Spiking neural network ,Quantitative Biology::Neurons and Cognition ,Artificial neural network ,Computer science ,business.industry ,Event (computing) ,Machine vision ,Noise reduction ,Biological neuron model ,Filter (signal processing) ,Noise ,Computer vision ,Artificial intelligence ,business - Abstract
Event-based dynamic vision sensors (DVS), inspired by biological vision systems, lead to new sensing and computing paradigms. The novel sensors output the sensed signal alone with many noise events asynchronously. Data-preprocessing for filtering these noises is significant before utilizing the data in applications such as classification, tracking and motion-data extraction. This paper describes a fully spike-based and neuromorphic-hardware-implementable neural network with a signal-oriented self-adaptive filtering time window for filtering the noise events robustly in the data captured by DVS. In particular, the simple leaky integrate-and-fire (LIF) neuron model is adopted as the basic elements of the network out of the purpose of hardware-friendly. Experiments based on both synthesized data and authentically-captured data are designed for quantitative comparison with traditional DVS noise filters to verify the outperformance of the proposed filter. The main contribution of this work is that the proposed spiking neural network (SNN) based filter achieves higher signal-noise-ratio (SNR) compared to traditional noise filters and performances more robust in the tolerance for changing signals.
- Published
- 2021
- Full Text
- View/download PDF
4. The Modeling Attack and Security Enhancement of the XbarPUF with Both Column Swapping and XORing
- Author
-
Xiaoxin Cui, Xiaole Cui, Yongliang Chen, and Wenqiang Ye
- Subjects
010302 applied physics ,Artificial neural network ,business.industry ,Computer science ,Physical unclonable function ,02 engineering and technology ,Challenge response ,021001 nanoscience & nanotechnology ,01 natural sciences ,Column (database) ,Embedded system ,0103 physical sciences ,Security enhancement ,0210 nano-technology ,business - Abstract
To address the security challenge of integrated circuits, the Physical Unclonable Function (PUF) is of great concern as the root of trust. However, the PUF circuits are suffering from the modeling attacks in recent years. The design of anti-modeling-attack PUF is still an open issue. The XbarPUF with both column swapping and XORing was reported as an anti-modeling-attack PUF in 2017. This work proposes a two-step attack method. The first step transforms the target PUF into the XbarPUFs with XORing only, based on the column swapping states. The second step attacks the XbarPUFs with XORing only by the intentionally designed Artificial Neural Network (ANN) model. This method can predict the challenge response pairs (CRPs) of the XbarPUF with both column swapping and XORing successfully. To enhance the anti-modeling-attack capability, an improved XbarPUF is further proposed, which uses the dynamic column swapping technique. The results show that the prediction accuracy of attacks for the XbarPUF with both column swapping and XORing and the proposed XbarPUF reaches 98.96% and 70%, respectively, if the training CRPs account for one millionth of the total CRPs. The proposed XbarPUF has a better anti-attack capability than the XbarPUF with both column swapping and XORing.
- Published
- 2021
- Full Text
- View/download PDF
5. ReTriple: Reduction of Redundant Rendering on Android Devices for Performance and Energy Optimizations
- Author
-
Xiaole Cui, Xianfeng Li, and Gengchao Li
- Subjects
Speedup ,business.industry ,Computer science ,020206 networking & telecommunications ,02 engineering and technology ,020202 computer hardware & architecture ,Rendering (computer graphics) ,User experience design ,Embedded system ,0202 electrical engineering, electronic engineering, information engineering ,Android (operating system) ,Graphics ,business ,Mobile device - Abstract
Graphics rendering is a compute-intensive work and a major source of energy consumption on battery-driven mobile devices. Unlike the existing works that degrade user experience or reuse rendering results coarsely, we propose ReTriple, a fine-grained scheme to reduce rendering workload by reusing the past rendering results at the UI element level. This fine-grained reuse mechanism can explore more opportunities to reduce the workload of the rendering process and save energy. The experiments tested with popular apps show that ReTriple achieves an average speedup of 2.6x and per-frame energy saving of 32.3% for the rendering process while improving user experience.
- Published
- 2020
- Full Text
- View/download PDF
6. Design and Test of the In-Array Build-In Self-Test Scheme for the Embedded RRAM Array
- Author
-
Xiaole Cui, Xiaoxin Cui, Qiujun Lin, Miaomiao Zhang, and Anqi Pang
- Subjects
Computer science ,Scan chain ,Hardware_PERFORMANCEANDRELIABILITY ,02 engineering and technology ,Memristor ,01 natural sciences ,RRAM test ,law.invention ,Digital pattern generator ,law ,0103 physical sciences ,LFSR ,Hardware_INTEGRATEDCIRCUITS ,0202 electrical engineering, electronic engineering, information engineering ,Hardware_ARITHMETICANDLOGICSTRUCTURES ,Electrical and Electronic Engineering ,010302 applied physics ,business.industry ,Signature (logic) ,020202 computer hardware & architecture ,Electronic, Optical and Magnetic Materials ,Resistive random-access memory ,MISR ,Built-in self-test ,Logic gate ,lcsh:Electrical engineering. Electronics. Nuclear engineering ,business ,lcsh:TK1-9971 ,XOR gate ,in-array BIST ,Computer hardware ,Biotechnology - Abstract
An in-array build-in self-test (BIST) scheme is proposed for the embedded resistive random access memory (RRAM) array. The BIST circuit consists of the linear-feedback-shift-register (LFSR)- based pattern generator and the multi-input signature register (MISR)-based response compactor, and both the n-stage LFSR and MISR are implemented by n + 2 in-array RRAM cells. The proposed LFSR/MISR circuit has better performance than the IMPLY-based counterpart, due to the application of the proposed three-cycle XOR gate and two-cycle shift gate with the in-array RRAM cells. And it is more area efficient comparing with the memristor ratioed logic (MRL)-based counterpart. The proposed n-stage LFSR/MISR circuit is tested by the scan chain method. The test method only has the linear time complexity. For the best of our knowledge, it is the first attempt to design the in-array BIST circuit for the RRAM array.
- Published
- 2019
- Full Text
- View/download PDF
7. Channel doping effects in negative capacitance field-effect transistors
- Author
-
Zhao Rong, Lining Zhang, Baoliang Liu, Xinnan Lin, Xiaoqing Huang, Xiaole Cui, Ning Feng, Yanxin Jiao, and Xuhui Chen
- Subjects
Work (thermodynamics) ,Materials science ,business.industry ,Doping ,Transistor ,Condensed Matter::Mesoscopic Systems and Quantum Hall Effect ,Condensed Matter Physics ,Electronic, Optical and Magnetic Materials ,law.invention ,Threshold voltage ,law ,Materials Chemistry ,Optoelectronics ,Field-effect transistor ,Electrical and Electronic Engineering ,business ,Negative impedance converter ,Communication channel ,Electronic circuit - Abstract
The channel doping effects in negative capacitance field-effect transistors (NCFETs) of the metal-ferroelectric-insulator-semiconductor (MFIS) structure are analysed in this work, and an analytical model is developed. The NCFET threshold voltage with channel doping is defined, and a nonmonotonic dependence on the doping concentrations is predicted. A unified charge formulation is developed for the current–voltage characteristics of double gate MFIS structures. Statistical modelling for NCFETs is further developed. Standard deviations of four parameters are extracted, reproducing the distributions of NCFET current–voltage characteristics. Experimental calibrated TCAD simulations validate the analytical model for wide ranges of device parameters, allowing its application to devices and circuits.
- Published
- 2021
- Full Text
- View/download PDF
8. Enhancing the Electrical Uniformity and Reliability of the HfO2-Based RRAM Using High-Permittivity Ta2O5 Side Wall
- Author
-
Shengdong Zhang, Ting-Chang Chang, Mei Yuan, Xinnan Lin, Xiaole Cui, Po-Hsun Chen, Hui-Chun Huang, Yi-Ting Tseng, Hang Zhou, and Chih-Cheng Shih
- Subjects
Permittivity ,Materials science ,02 engineering and technology ,Resistive random access memory (RRAM) ,forming voltage ,01 natural sciences ,Switching time ,Reliability (semiconductor) ,HfO2-based RRAM ,Electric field ,0103 physical sciences ,spacer ,switching speed ,Electrical and Electronic Engineering ,Scaling ,010302 applied physics ,business.industry ,021001 nanoscience & nanotechnology ,Electronic, Optical and Magnetic Materials ,Resistive random-access memory ,Electrode ,Optoelectronics ,lcsh:Electrical engineering. Electronics. Nuclear engineering ,0210 nano-technology ,business ,lcsh:TK1-9971 ,Biotechnology ,Voltage - Abstract
In conventional HfO2-based resistive random access memory (RRAM), SiO2 is usually adopted as side wall spacer (low-k spacer) to define the device feature size. It is found that the forming voltage of the conventional HfO2 RRAM with SiO2 spacer rises when the device size is scaling down from 16.0 μm2 to 0.16 μm2, which is detrimental for application of high density HfO2-based RRAM. In this study, a high permittivity side wall spacer (high-k spacer) Ta2O5 is introduced to replace SiO2 spacer. The Ta2O5 side wall effectively suppress the forming voltage rising issues during RRAM device scaling without introducing costly processing steps. Moreover, compared to the conventional HfO2-based RRAM, the side wall enhanced device exhibits faster switching speed, smaller operation voltage, and higher reliabilities, including endurance and retention. As a result, the use of Ta2O5 side wall significantly enhances the overall switching characteristics of the HfO2-based RRAM device.
- Published
- 2018
- Full Text
- View/download PDF
9. Design of Low-Power High-Performance FinFET Standard Cells
- Author
-
Kai Liao, Nan Liao, Tian Wang, Dunshan Yu, Xiaoxin Cui, and Xiaole Cui
- Subjects
Very-large-scale integration ,Standard cell ,Adder ,Engineering ,business.industry ,Applied Mathematics ,Transistor ,020207 software engineering ,02 engineering and technology ,020202 computer hardware & architecture ,Power (physics) ,law.invention ,Reduction (complexity) ,law ,Signal Processing ,0202 electrical engineering, electronic engineering, information engineering ,Electronic engineering ,Systems design ,business ,Voltage - Abstract
With the leakage power becoming a most important concern in deep sub-micron designs, the advent of FinFET offers promising options due to its superior electrical properties and design flexibility. To support the VLSI digital system design flow based on the standard cells in FinFET, the building method of optimized FinFET standard cells is proposed. This method is derived on the basis of jointly optimizing the back-gate voltages and the width to length ratio of the transistors in the stacked structure in each standard cell under the premise of maintaining the performance. By employing this design method, optimized standard cells are generated and form a low-power high-performance standard cell library. Simulation results of the standard cells designed with our proposed method demonstrate that the leakage power can be reduced by a factor of 47.99 at most while the worst-case delay can achieve a maximum reduction of 10.17%. Monte Carlo simulation results illustrate that the optimized cells can gain more dependability to process variations and environmental changes. The 16-bit ripple carry adder implemented with this optimized FinFET library can obtain a maximum leakage power reduction of 59.6% and a worst-case delay reduction of 21.8%.
- Published
- 2017
- Full Text
- View/download PDF
10. An Enhancement of Crosstalk Avoidance Code Based on Fibonacci Numeral System for Through Silicon Vias
- Author
-
Jin Yufeng, Yewen Ni, Min Miao, Xiaoxin Cui, and Xiaole Cui
- Subjects
010302 applied physics ,Engineering ,Fibonacci number ,business.industry ,Code word ,Binary number ,Hardware_PERFORMANCEANDRELIABILITY ,02 engineering and technology ,Integrated circuit ,01 natural sciences ,Capacitance ,020202 computer hardware & architecture ,law.invention ,Hardware and Architecture ,law ,0103 physical sciences ,Hardware_INTEGRATEDCIRCUITS ,0202 electrical engineering, electronic engineering, information engineering ,Redundancy (engineering) ,Bit error rate ,Electronic engineering ,Signal integrity ,Electrical and Electronic Engineering ,business ,Software - Abstract
Through silicon vias (TSVs) play an important role as the vertical electrical connections in 3-D stacked integrated circuits. However, the closely clustered TSVs suffer from the crosstalk noise between the neighboring TSVs, and result in the extra delay and the deterioration of signal integrity. For a $3 \times 3$ TSV array, the severity of crosstalk noise in the center victim TSV is classified into 11 levels, which is defined as 0C to 10C from low noise to high noise, depending on the combinations of the digital patterns applied to the TSV array. An enhanced code based on the Fibonacci number system (FNS) to suppress the crosstalk noise below 6C level is proposed, in which both the redundancy of numbers and the nonuniqueness of Fibonacci-based binary codeword are utilized to search the proper codeword. Experimental results show that the proposed technique decreases about 22% latency of TSVs comparing with the worst crosstalk cases. This technique is applicable in the large-scale TSV array for it has a quasi-linear hardware overhead, and its system overhead is less than that of the 3-D 4-LAT counterpart if the data width is greater than 18, and it has good usability for it consumes less power per TSV and achieves lower bit error rate at the interested frequency range comparing with that of the original FNS coding technique.
- Published
- 2017
- Full Text
- View/download PDF
11. Performance optimization of lateral AlGaN/GaN HEMTs with cap gate on 150-mm silicon substrate
- Author
-
Dongmin Chen, Meihua Liu, Chen Jianguo, Sun Hui, Xinnan Lin, Xiaole Cui, and Peng Liu
- Subjects
010302 applied physics ,Materials science ,Silicon ,Equivalent series resistance ,business.industry ,chemistry.chemical_element ,Time-dependent gate oxide breakdown ,Algan gan ,02 engineering and technology ,021001 nanoscience & nanotechnology ,Condensed Matter Physics ,01 natural sciences ,Electronic, Optical and Magnetic Materials ,chemistry ,Gate oxide ,0103 physical sciences ,Materials Chemistry ,Breakdown voltage ,Optoelectronics ,Electrical and Electronic Engineering ,0210 nano-technology ,business ,Voltage ,Leakage (electronics) - Abstract
A further leakage reduction of AlGaN/GaN HEMTs with cap gate (CG-HEMTs) has been achieved by optimizing the gate structure and the gate etching process. The optimized CG-HEMTs single finger power HEMTs deliver I DSmax = 533 mA/mm at least with gate length of 0.5um and show a median gate leakage current of 20 nA/mm 25 °C measured at a drain voltage of 200 V. The breakdown voltage (BV) of CG-HEMTs was evaluated by the variation of drain-to-gate spacing (L DG ) larger than 8 μm. Furthermore, we show that the forward voltage of CG-HEMTs can be improved by shrinking the lateral dimension of the edge termination due to reduced series resistance.
- Published
- 2017
- Full Text
- View/download PDF
12. High-Performance Noninvasive Side-Channel Attack Resistant ECC Coprocessor for GF(2m )
- Author
-
Xiaoxin Cui, Xiaole Cui, Tian Wang, Kai Liao, Dunshan Yu, and Nan Liao
- Subjects
Coprocessor ,Modular arithmetic ,business.industry ,Computer science ,020208 electrical & electronic engineering ,02 engineering and technology ,Parallel computing ,Scalar multiplication ,020202 computer hardware & architecture ,Public-key cryptography ,Timing attack ,Finite field ,Control and Systems Engineering ,Embedded system ,0202 electrical engineering, electronic engineering, information engineering ,Multiplication ,Side channel attack ,Hardware_ARITHMETICANDLOGICSTRUCTURES ,Electrical and Electronic Engineering ,Elliptic curve cryptography ,business - Abstract
Elliptic curve cryptography (ECC) is one of the most popular public key cryptosystems in recent years due to its higher security strength and lower resource consumption. However, the noninvasive side-channel attacks (SCAs) have been proved to be a big threat to ECC systems in many previous researches. In this paper, we propose a low-area-time-product ECC coprocessor for GF(2 m ) with the ability to resist most of the existing noninvasive SCAs. The basic countermeasures are relied on the underlying finite field arithmetics in randomized Montgomery domain, which can blind the intermediate value in the iterations of scalar multiplication to prevent the adversaries from cracking the private key by statistical methods. Meanwhile, we optimize the modular division and modular multiplication algorithms to fix the operating time to resist some certain timing attacks, and the Montgomery Ladder algorithm makes the coprocessor immune against simple SCAs. To efficiently implement our coprocessor, we present a hybrid operation sequence which merely needs one multiplication module and one division module to complete the entire operations. The synthesis results indicate that our design is superior to other related works in area-time product (ATP) and the extra overhead paid for the countermeasures is less than 5%.
- Published
- 2017
- Full Text
- View/download PDF
13. Moving Vehicle Attitude Tracking Algorithm Based on MEMS Inertial Navigation System
- Author
-
Xiaole Cui, Yuyu Lai, Guangyi Shi, Geng Xiaodong, Xiao Ma, and Yentze Ko
- Subjects
Noise measurement ,business.industry ,Computer science ,MathematicsofComputing_NUMERICALANALYSIS ,ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION ,Physics::Physics Education ,Tracking system ,Gyroscope ,Kalman filter ,Accelerometer ,law.invention ,Computer Science::Robotics ,Extended Kalman filter ,law ,business ,Quaternion ,Algorithm ,Inertial navigation system ,ComputingMethodologies_COMPUTERGRAPHICS - Abstract
Aiming at the dynamic attitude tracking system of vehicle motion, the vehicle attitude measurement and calculation are performed using a combination of three-axis accelerometer and three-axis gyroscope. Proposed a quaternion Extended Kalman Filter (EKF) algorithm for dynamic attitude tracking system. Through the Euler angle and quaternion transformation method, the attitude quaternion of the gyroscope is used as the state quantity of the EKF algorithm. The attitude quaternion calculated by the accelerometer is used as the observation quantity. And corrected by adaptive measurement noise covariance matrix. Established Kalman equation to obtain a high-precision attitude quaternion to solve the attitude angle. The experimental results show that the algorithm effectively solves the shortcomings of low accuracy and large error of MEMS sensors, and improves the accuracy of vehicle attitude tracking system.
- Published
- 2018
- Full Text
- View/download PDF
14. A Novel Polymorphic Gate Based Circuit Fingerprinting Technique
- Author
-
Gang Qu, Timothy Dunlap, Xiaole Cui, Tian Wang, Xiaoxin Cui, Dunshan Yu, and Omid Aramoon
- Subjects
Low overhead ,Computer science ,business.industry ,06 humanities and the arts ,01 natural sciences ,Satisfiability ,010305 fluids & plasmas ,060104 history ,Robustness (computer science) ,0103 physical sciences ,Hardware_INTEGRATEDCIRCUITS ,Embedding ,0601 history and archaeology ,business ,Computer hardware ,Electronic circuit ,Voltage - Abstract
Polymorphic gates are reconfigurable devices that deliver multiple functionalities at different temperature, supply voltage or external inputs. Capable of working in different modes, polymorphic gate is a promising candidate for embedding secret information such as fingerprints. In this paper we report five polymorphic gates whose functionality varies in response to specific control input and propose a circuit fingerprinting scheme based on these gates. The scheme selectively replaces standard logic cells by polymorphic gates whose functionality differs with the standard cells only on Satisfiability Don't Care conditions. Additional dummy fingerprint bits are also introduced to enhance the fingerprint's robustness against attacks such as fingerprint removal and modification. Experimental results on ISCAS and MCNC benchmark circuits demonstrate that our scheme introduces low overhead. More specifically, the average overhead in area, speed and power are 4.04%, 6.97% and 4.15% respectively when we embed 64-bit fingerprint that consists of 32 real fingerprint bits and 32 dummy bits. This is only half of the overhead of the other known approach when they create 32-bit fingerprints.
- Published
- 2018
- Full Text
- View/download PDF
15. A universal implementation of cardiovascular disease surveillance based on HRV
- Author
-
Yufan Feng, Ying Zhang, Xin'an Wang, and Xiaole Cui
- Subjects
Statistical classification ,Warning system ,business.industry ,Computer science ,Frequency domain ,Heart rate variability ,Boundary (topology) ,Pattern recognition ,Time domain ,Sensitivity (control systems) ,Artificial intelligence ,business ,Weighting - Abstract
Heart Rate Variability (HRV) refers to such a quantitative scale measurement, which can reflect the regularity of heart rate changes. Taking two common cardiovascular diseases as an example, this paper obtained 14 eigenvalues by analyzing the HRV data taken from PhysioNet in the time domain and frequency domain through the “normperiod” code. Accordingly, disease classification was carried out using an improved K-Nearest Neighbor (KNN) algorithm, including module of removing boundary, uniform density and distance weighting. Finally, we obtained an accuracy of up to 98% and a sensitivity of up to 100%. The results illustrate that this approach with low computational cost enables surveillance and early warning of a large group of cardiovascular diseases effectively.
- Published
- 2018
- Full Text
- View/download PDF
16. Low Power High Performance FinFET Standard Cells Based on Mixed Back Biasing Technology
- Author
-
Xiaoxin Cui, Kai Liao, Xiaole Cui, Tian Wang, Nan Liao, and Yu Dunshan
- Subjects
Very-large-scale integration ,Standard cell ,Computer science ,business.industry ,Electrical engineering ,Stacking ,020207 software engineering ,Biasing ,02 engineering and technology ,020202 computer hardware & architecture ,Electronic, Optical and Magnetic Materials ,Power (physics) ,0202 electrical engineering, electronic engineering, information engineering ,Electronic engineering ,Electrical and Electronic Engineering ,business - Published
- 2016
- Full Text
- View/download PDF
17. Self‐heating burn‐in pattern generation based on the genetic algorithm incorporated with a BACK‐like procedure
- Author
-
Zuolin Cheng, Chung Len Lee, Xiaole Cui, and Xiaoxin Cui
- Subjects
Engineering ,business.industry ,Computation ,Integrated circuit ,Dissipation ,Measure (mathematics) ,law.invention ,Hardware and Architecture ,law ,Genetic algorithm ,Burn-in ,Node (circuits) ,Electrical and Electronic Engineering ,business ,Pattern sequence ,Algorithm ,Software - Abstract
In integrated circuit (IC) burn-in, it is desirable to produce efficient input patterns to assist heating for circuit under test. This study proposes and demonstrates an approach which uses the genetic algorithm incorporating with a BACK-like procedure to generate the patterns which produce the maximal and/or uniform node transition as well as power dissipation for burn-in application. A multi-step strategy is applied in the algorithm, and a transition measure is defined to guide the backtracing of the BACK-like procedure, improving the efficiency in searching the target patterns. Experimental results show that the approach generates better pattern pairs which produce either the maximal transition count or the maximal power dissipation than that of all the other published results. It is also able to generate the pattern sequence which achieves more uniformly stressing, by 30% improvement statistically, for each gate of the circuit under test. The computation time, because of using a divide-and-conquer strategy in this approach, is also reasonable, making it useful in the practical IC burn-in application.
- Published
- 2015
- Full Text
- View/download PDF
18. Design of router for spiking neural networks
- Author
-
Xiaole Cui, Qiankun Han, Yewen Ni, Xiaoxin Cui, Kefei Liu, and Yuanning Fan
- Subjects
Router ,Spiking neural network ,Interconnection ,Artificial neural network ,business.industry ,Natural computing ,Computer science ,Cognitive computing ,02 engineering and technology ,020202 computer hardware & architecture ,Traffic congestion ,0202 electrical engineering, electronic engineering, information engineering ,Architecture ,business ,Computer network - Abstract
The development of large-scale networks with artificial neurons and adaptive synapses has suggested new avenues of exploration for brain-like cognitive computing. Spiking neural networks (SNNs), highly inspired from natural computing in the brain and recent advances in neurosciences, are often referred to as the 3th generation of neural network, and become a new research hotspot in the era of artificial intelligence. SNN architecture supports simpler category of biologically-inspired neuron models and more complex large-scale interconnection in on-chip network of neurosynaptic cores. This paper introduces the design of router used in a spiking neural network, which is able to send and receive spiking information in network properly, as well as perfectly dealing with network anomaly such as data race or traffic congestion. This router is designed for the network at a scale of 64 ∗ 64 neurosynaptic cores at the most, with 256 neurons in each cores. Both the area and estimated power consumption is acceptable. This router could also be applied to larger scale of SNN architecture networks effectively.
- Published
- 2017
- Full Text
- View/download PDF
19. A practical cold boot attack on RSA private keys
- Author
-
Xiaole Cui, Tian Wang, Xiaoxin Cui, Gang Qu, Dunshan Yu, and Yewen Ni
- Subjects
Computer science ,business.industry ,Cold boot attack ,Approximation algorithm ,02 engineering and technology ,Encryption ,Upper and lower bounds ,Power (physics) ,Bit (horse) ,020204 information systems ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,Hidden Markov model ,Error detection and correction ,business ,Algorithm ,Computer Science::Cryptography and Security - Abstract
In cold boot attacks, attackers attempt to retrieve encryption keys from the memory after the system is powered off. One representative cold boot attack, known as HMM algorithm, can break RSA with success probabilities as high as 82%. However, it, like other cold boot attacks, uses the symmetric memory decay model, which assumes that a bit is equally likely to change from 1 to 0 and from 0 to 1. It also requires that the bit error probability to be relatively small, which means that the attack must be launched within seconds of system power off. In this paper, we first show that under more realistic assumptions, HMM's success probability drops to 2.3%. We then propose a practical improvement of HMM algorithm with a proven lower bound on success probability and low runtime complexity. We conduct simulation and the results confirm that our approach improves HMM's chance of breaking RSA to 49.96%.
- Published
- 2017
- Full Text
- View/download PDF
20. Improving DFA on AES using all-fault ciphertexts
- Author
-
Yewen Ni, Kefei Liu, Xiaoxin Cui, Tian Wang, Qiankun Han, Xiaole Cui, and Yuanning Fan
- Subjects
Differential fault analysis ,Computer science ,business.industry ,Fault attack ,Process (computing) ,020207 software engineering ,Hardware_PERFORMANCEANDRELIABILITY ,Data_CODINGANDINFORMATIONTHEORY ,02 engineering and technology ,Fault (power engineering) ,Encryption ,Electronic mail ,0202 electrical engineering, electronic engineering, information engineering ,Key (cryptography) ,020201 artificial intelligence & image processing ,Fault model ,business ,Algorithm - Abstract
The traditional random multi-byte fault model in AES fault attack only uses the faulty ciphertexts with diagonal-fault distributions to implement differential fault analysis. When there are not enough exploitable faulty ciphertexts, the round key could not be confirmed directly, and a comparatively large search space is still left for brute-force attack. In this paper, an improved differential fault analysis (DFA) using all-fault ciphertexts on AES was proposed. The all-fault ciphertexts could be used to optimize the selection of the brute-force space, which is helpful to recover the secret key quickly and improves the analysis efficiency. The experiment result demonstrated that by applying the DFA with all-fault ciphertexts, the time consumed on the brute-force attack can be reduced 60.81% on average, which significantly accelerated the process of cracking AES.
- Published
- 2017
- Full Text
- View/download PDF
21. Improving DFA attacks on AES with unknown and random faults
- Author
-
Dunshan Yu, Nan Liao, Xiaoxin Cui, Kai Liao, Xiaole Cui, and Tian Wang
- Subjects
General Computer Science ,Differential fault analysis ,business.industry ,Computation ,Advanced Encryption Standard ,020207 software engineering ,02 engineering and technology ,Fault injection ,Fault (power engineering) ,Voltage violation ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,Fault model ,business ,Field-programmable gate array ,Algorithm ,Mathematics - Abstract
Differential fault analysis (DFA) aiming at the advanced encryption standard (AES) hardware implementations has become a widely research topic. Unlike theoretical model, in real attack scenarios, popular and practical fault injection methods like supply voltage variation will introduce faults with random locations, unknown values and multibyte. For analyzing this kind of faults, the previous fault model needed six pairs of correct and faulty ciphertexts to recover the secret round-key. In this paper, on the premise of accuracy, a more efficient DFA attack with unknown and random faults is proposed. We introduce the concept of theoretical candidate number in the fault analysis. Based on this concept, the correct round-key can be identified in advance, so the proposed attack method can always use the least pairs of correct and faulty ciphertexts to accomplish the DFA attacks. To further support our opinion, random fault attacks based on voltage violation were taken on an FPGA board. Experiment results showed that about 97.3% of the attacks can be completed within 3 pairs of correct and faulty ciphertexts. Moreover, on average only 2.17 pairs of correct and faulty ciphertexts were needed to find out the correct round-key, showing significant advantage of efficiency compared with previous fault models. On the other hand, less amount of computation in the analyses can be realized with a high probability with our model, which also effectively improves the time efficiency in DFA attacks with unknown and random faults.
- Published
- 2016
- Full Text
- View/download PDF
22. Session-less test scheduling for multi-tower 3D-SICs
- Author
-
Mengying Luo, Wenming Wang, Yang Hu, Xiaole Cui, and Shengming Zhou
- Subjects
Engineering ,business.industry ,020208 electrical & electronic engineering ,02 engineering and technology ,020202 computer hardware & architecture ,Test (assessment) ,Stack (abstract data type) ,0202 electrical engineering, electronic engineering, information engineering ,Electronic engineering ,Session (computer science) ,Layer (object-oriented design) ,Test scheduling ,business ,Tower ,Simulation - Abstract
This study presents a test scheduling strategy for multi-tower three dimensional (3D) stacked ICs (SICs). Towards the given complete stack, a session-less based test scheduling method is proposed. Experimental results show that the proposed method minimizes the total test time under the constraints of the number of test TSVs and test pins. Besides, it is found out that the 3D-SIC configuration in which complex dies integrating on the lower layer of each tower results in shorter test time.
- Published
- 2016
- Full Text
- View/download PDF
23. A spike neuron network prototype based on RRAM Array
- Author
-
Jipeng Liu, Chunliang Liu, Xiaole Cui, Jinfeng Kang, Shengming Zhou, Yue Tang, and Xiaoyan Xu
- Subjects
010302 applied physics ,Scheme (programming language) ,Computer science ,business.industry ,020206 networking & telecommunications ,02 engineering and technology ,01 natural sciences ,Resistive random-access memory ,Synapse ,Neuromorphic engineering ,0103 physical sciences ,0202 electrical engineering, electronic engineering, information engineering ,Electronic engineering ,Spike (software development) ,Neuron network ,business ,Field-programmable gate array ,computer ,Massively parallel ,Computer hardware ,computer.programming_language - Abstract
The neuromorphic computing is an emerging paradigm for multimedia applications due to the features of massive parallelism, adaptivity to the complex input information, and its tolerance to errors. The oxide-based resistive switching device is a promising candidate to implement the synapse functions of neuron network due to the extra-low energy loss per spike. This work implements a simplified circuit system of neuromorphic visual system using the real RRAM devices with spike tuning scheme, and its capability of learning is validated.
- Published
- 2016
- Full Text
- View/download PDF
24. A prebond TSV test scheme using oscillator
- Author
-
Chi Yu, Xiaole Cui, and Shengming Zhou
- Subjects
Scheme (programming language) ,Engineering ,Interconnection ,business.industry ,0202 electrical engineering, electronic engineering, information engineering ,Electronic engineering ,020201 artificial intelligence & image processing ,02 engineering and technology ,business ,computer ,020202 computer hardware & architecture ,computer.programming_language - Abstract
The TSV(Through-Silicon Via) plays an important role of inter-layer interconnection in 3D ICs. However, TSV is defect prone. This paper proposes a new scheme based on oscillator to monitor the defects of TSV at the prebond stage.
- Published
- 2016
- Full Text
- View/download PDF
25. An optimization algorithm for pre-bond TSV probing tests and fault localization
- Author
-
Shengming Zhou, Xiaoyan Xu, Chi Yu, Xiaole Cui, and Long Chen
- Subjects
Engineering ,Through-silicon via ,Optimization algorithm ,business.industry ,020208 electrical & electronic engineering ,020206 networking & telecommunications ,Hardware_PERFORMANCEANDRELIABILITY ,02 engineering and technology ,Fault (power engineering) ,law.invention ,Reduction (complexity) ,Set (abstract data type) ,Capacitor ,law ,Hardware_INTEGRATEDCIRCUITS ,0202 electrical engineering, electronic engineering, information engineering ,Electronic engineering ,Hardware_ARITHMETICANDLOGICSTRUCTURES ,business ,Simulation - Abstract
The pre-bond through silicon via (TSV) probing tests and fault localization are important for yield assurance in 3D-SICs. This paper proposes an optimization algorithm to generate the preferable set of test sessions for pre-bond TSV probing tests. Test sessions generated by the optimization algorithm can not only get localization of faulty TSVs in TSV network, but also reduce test time and cost of the pre-bond TSV test. By using the proposed optimization algorithm, the reduction in pre-bond TSV test time is 10% for the pinpointing of four faulty TSVs in 13-TSV network and even 20.5% for one faulty TSV in 6-TSV network compared to the original one [4].
- Published
- 2016
- Full Text
- View/download PDF
26. Bus partitioning technique with crosstalk avoidance code
- Author
-
Jiantong Jiang, Xiaole Cui, Shengming Zhou, Yalin Ran, Yang Hu, and Mengying Luo
- Subjects
Very-large-scale integration ,Engineering ,Circuit performance ,business.industry ,Hardware_PERFORMANCEANDRELIABILITY ,02 engineering and technology ,020202 computer hardware & architecture ,Crosstalk ,Electromagnetic shielding ,Hardware_INTEGRATEDCIRCUITS ,0202 electrical engineering, electronic engineering, information engineering ,Electronic engineering ,Codec ,business - Abstract
In the VLSI, the crosstalk is a crucial problem for the circuit performance improvement. Both the crosstalk avoidance code (CAC) and shielding wire technique can effectively eliminate the crosstalk noise. But the CAC consumes too much codec area and codec power with the increase of the bus width, and the shielding wire technique costs too much system overhead. This work tries to combine the CAC technique and the shielding method into a bus partitioning scheme. It can effectively eliminate crosstalk, and simultaneously reduce codec area and codec power, as well as the system overhead. The forbidden pattern free (FPF) CAC, which is based on the Fibonacci Numeral System (FNS), is applied to the partitioned sub-buses. The experimental results show that the codec area and codec power of the partitioned bus are 7.8% and 25.67%, respectively, of the non-partitioned bus in 30-bit bus.
- Published
- 2016
- Full Text
- View/download PDF
27. Sneak-path based test for 3D stacked one-transistor-N-RRAM array
- Author
-
Shengming Zhou, Xin'an Wang, Ma Zhi, Qiang Zhang, Xiaole Cui, and Xiaoyan Xu
- Subjects
law ,business.industry ,Computer science ,020208 electrical & electronic engineering ,Transistor ,Path (graph theory) ,0202 electrical engineering, electronic engineering, information engineering ,Electrical engineering ,02 engineering and technology ,business ,020202 computer hardware & architecture ,law.invention ,Resistive random-access memory - Published
- 2016
- Full Text
- View/download PDF
28. An algorithm of training sample selection for integrated circuit device modeling based on artificial neural networks
- Author
-
Lining Zhang, Xinnan Lin, Xiaole Cui, and Zhiyuan Zhang
- Subjects
Sample selection ,Artificial neural network ,business.industry ,Computer science ,Training (meteorology) ,02 engineering and technology ,Integrated circuit ,021001 nanoscience & nanotechnology ,Machine learning ,computer.software_genre ,01 natural sciences ,law.invention ,law ,0103 physical sciences ,Artificial intelligence ,010306 general physics ,0210 nano-technology ,business ,computer - Published
- 2016
- Full Text
- View/download PDF
29. A crosstalk avoidance method combining crosstalk avoidance code with shielding wire technique
- Author
-
Yalin Ran, Xiaoyan Xu, Yufeng Jin, Xiaoxin Cui, and Xiaole Cui
- Subjects
010302 applied physics ,Engineering ,business.industry ,Electrical engineering ,Three-dimensional integrated circuit ,02 engineering and technology ,Integrated circuit ,01 natural sciences ,Capacitance ,020202 computer hardware & architecture ,law.invention ,Crosstalk ,law ,0103 physical sciences ,Electromagnetic shielding ,0202 electrical engineering, electronic engineering, information engineering ,Electronic engineering ,business - Abstract
Through-silicon vias (TSVs) play an important role as the vertical connections in three dimensional (3D) integrated circuit (IC). However, the 3D IC suffers from the increasing crosstalk noise between TSVs as the working frequency gets higher. The crosstalk in TSV arrays is more complicated than that of 2D IC because more aggressors have to be considered. This paper proposes a crosstalk avoidance method combining the crosstalk avoidance code (CAC) with the shielding wire technique by dividing the TSV array into some 3×3 sub-arrays. This method can suppress the crosstalk in TSV array below 4.5C level, which elevates the performance of 3D IC effectively.
- Published
- 2016
- Full Text
- View/download PDF
30. A high-efficient fault attack on AES S-box
- Author
-
Tian Wang, Dunshan Yu, Kai Liao, Nan Liao, Xiaole Cui, and Xiaoxin Cui
- Subjects
021110 strategic, defence & security studies ,S-box ,Differential fault analysis ,Computer science ,business.industry ,Real-time computing ,0211 other engineering and technologies ,Process (computing) ,Cryptography ,02 engineering and technology ,Fault (power engineering) ,Encryption ,020202 computer hardware & architecture ,0202 electrical engineering, electronic engineering, information engineering ,Key (cryptography) ,Fault model ,business ,Algorithm - Abstract
A high-efficient fault attack on AES S-box is proposed in this paper. Faults are introduced in the encryption process by changing the mapping relationship of S-box. Based on the round in which the faults are introduced, two fault models are presented. Attack results show that the first model only needs 16 faulty ciphertexts to recover the 128-bit secret key. The second fault model is more efficient. In this model, two rounds of attacks are enough to find out the 4-byte round-key based on DFA on the 9th round S-box. For covering all the possible fault situations, influence of multi-byte faults are considered, which effectively improves the attack accuracy and reduces the attack rounds. Compared with previous fault models, our work in this paper shows significant advantage of efficiency.
- Published
- 2016
- Full Text
- View/download PDF
31. Efficient method for random fault attack against AES hardware implementation
- Author
-
Nan Liao, Xiaole Cui, Tian Wang, Dunshan Yu, Xiaoxin Cui, and Kai Liao
- Subjects
business.industry ,Computer science ,Advanced Encryption Standard ,Fault attack ,Key (cryptography) ,40-bit encryption ,Fault model ,business ,Encryption ,Fault (power engineering) ,Computer hardware ,Electronic mail - Abstract
Random fault attacks against Advanced Encryption Standard (AES) hardware implementation are widely researched. In the previous fault analysis, 6 rounds of attacks are required to recover the correct round-key, which is not efficient enough for extensive analysis. In this paper, a more efficient fault model is proposed. Based on the analysis of theoretical key candidate number, the proposed attack method can complete the analysis as few as 3 rounds. Experiment results shows that nearly 90% of the attacks recover the correct round-key with 3 rounds and in average only 3.125 rounds are required with our proposed attack method.
- Published
- 2016
- Full Text
- View/download PDF
32. A snake addressing scheme for phase change memory testing
- Author
-
Zuolin Cheng, Zhitang Song, Yiqun Wei, Chung Len Lee, Xinnan Lin, Chen Xiaogang, and Xiaole Cui
- Subjects
Scheme (programming language) ,Hardware_MEMORYSTRUCTURES ,General Computer Science ,Computer science ,business.industry ,Hardware_PERFORMANCEANDRELIABILITY ,02 engineering and technology ,Path testing ,021001 nanoscience & nanotechnology ,Fault (power engineering) ,020202 computer hardware & architecture ,Phase-change memory ,Non-volatile memory ,Test algorithm ,Fault coverage ,0202 electrical engineering, electronic engineering, information engineering ,Fault model ,0210 nano-technology ,business ,computer ,Simulation ,Computer hardware ,computer.programming_language - Abstract
Phase change memory (PCM) is one of the most promising candidates for next generation nonvolatile memory. However, PCM suffers from a variety of faults due to its special device structure and operation mechanism. A snake addressing scheme is introduced into the test algorithms of PCM to reduce the test time and excite proximity disturb faults more effectively. The March test algorithm with the proposed snake addressing scheme is less complex than most traditional test algorithms. In addition to conventional faults, it is capable of covering disturb and parasitic faults. Moreover, when incorporated with the sneak path testing method, it is able to test the read fault, read recovery fault, incomplete program fault 0, and false write fault.
- Published
- 2016
- Full Text
- View/download PDF
33. Post-bond test for TSVs using voltage division
- Author
-
Bingqiang Jing, Xiaole Cui, Yufeng Jin, and Yalin Ran
- Subjects
Engineering ,Silicon ,business.industry ,Voltage divider ,Process (computing) ,chemistry.chemical_element ,Process variable ,Integrated circuit ,law.invention ,Electric power transmission ,chemistry ,law ,Electronic engineering ,business - Abstract
Through Silicon Vias (TSVs) are the transmission lines between different bonding layers and are indispensable elements in three-dimensional integrated circuits (3D-ICs). But because of process problems, kinds of defects exist in TSVs, including open defects and short defects. A variety of test methods have been proposed for open defects, but few can deal with both open defects and short defects. In this work, a post-bond method is presented for both defects by using voltage division. TSVs with defects can be located by testing the output pulses. HSPICE simulations including process parameter variations show the effectiveness of the method.
- Published
- 2015
- Full Text
- View/download PDF
34. Employing the mixed FBB/RBB in the design of FinFET logic gates
- Author
-
Tian Wang, Xiaole Cui, Yewen Ni, Nan Liao, Xiaoxin Cui, Dunshan Yu, and Kai Liao
- Subjects
Engineering ,Adder ,Pass transistor logic ,business.industry ,Transistor ,Electrical engineering ,Hardware_PERFORMANCEANDRELIABILITY ,law.invention ,PMOS logic ,law ,Logic gate ,Hardware_INTEGRATEDCIRCUITS ,Electronic engineering ,business ,NMOS logic ,Hardware_LOGICDESIGN ,Leakage (electronics) ,Electronic circuit - Abstract
Series structures are inevitable and common in the design of digital logic gates. In this paper, to reduce the leakage power, we transplant the technique of mixed forward and reverse back-gate bias (mixed FBB/RBB) from FinFET forced stacks to the more widely-used series structures in FinFET logic gates. By employing the mixed FBB/RBB technique, the goal of leakage reduction is achieved without speed penalty. Performance of series structures of NMOS/PMOS transistors are studied. Simulation results based on the Predictive Technology Model 32nm FinFET model indicate that the speed can be maintained the same while reducing the leakage up to a factor of 18.3 compared with the structure without mixed back-gate biasing. This approach provides us a new viewpoint in designing low stand-by circuits without any sacrifice in the speed. The 16-bit ripple carry adder based on this methodology can acquire at least 51.8% leakage reduction.
- Published
- 2015
- Full Text
- View/download PDF
35. A TSV repair method for clustered faults
- Author
-
Yufeng Jin, Qiang Zhang, Shijie Zhang, and Xiaole Cui
- Subjects
Router ,Engineering ,business.industry ,Reliability (computer networking) ,Stacking ,% area reduction ,High density ,Hardware_PERFORMANCEANDRELIABILITY ,Integrated circuit ,Repair method ,law.invention ,law ,Hardware_INTEGRATEDCIRCUITS ,Electronic engineering ,High bandwidth ,business - Abstract
Three-dimensional integrated circuits (3D-ICs) using Through-silicon Vias (TSVs) allow the stacking multiple dies to manufacture chips with many benefits, such as high density and high bandwidth. Unfortunately, the yield of 3D dies, stacking with a large number of TSVs is significantly impacted by the reliability of TSVs. In order to improve the yield of 3D-ICs, TSVs must be reparable. In practice, the faulty TSVs may cluster because of the imperfect bonding quality of TSVs. A right trapezoidal grouping based method was proposed to repair clustered faulty TSVs in this paper. Experimental results show that the yield of the proposed method is 99.80% with 50% area reduction compared to that of the router-based method.
- Published
- 2015
- Full Text
- View/download PDF
36. A high-efficient and accurate fault model aiming at FPGA-based AES cryptographic applications
- Author
-
Xiaole Cui, Tian Wang, Kai Liao, Yewen Ni, Xiaoxin Cui, Nan Liao, and Dunshan Yu
- Subjects
Stuck-at fault ,Engineering ,business.industry ,Embedded system ,Key (cryptography) ,Cryptography ,Hardware_PERFORMANCEANDRELIABILITY ,Fault model ,business ,Field-programmable gate array ,Fault (power engineering) - Abstract
Setup time variation fault attacks that aim straightly at the FPGA devices have become hot spots nowadays. A high-efficient and accurate fault model aiming at FPGA-based cryptographic applications is proposed in this paper. Multi-diagonal faults are considered in this paper, thus more exploitable faulty ciphertexts can be gathered compared with the previous model. Multi-fault analysis is introduced due to the existence of multi-fault injection, which guarantees the accuracy of the result. Experiment result shows that the fault model brings a significant increase up to 36.5% of the exploitable faults compared with the previous method. Within 24 pairs of correct and faulty ciphertexts, the complete round key can be retrieved by this model.
- Published
- 2015
- Full Text
- View/download PDF
37. Impact of channel line-edge roughness on junctionless FinFET
- Author
-
Xinnan Lin, Xiaole Cui, Baili Zhang, Lining Zhang, Ying Xiao, and Haijun Lou
- Subjects
Statistical simulation ,Materials science ,business.industry ,Electrical engineering ,Optoelectronics ,Surface finish ,Channel width ,business ,Line edge roughness ,Communication channel ,Threshold voltage - Abstract
The impact of channel line-edge roughness (LER) on Junctionless FinFET device (JL-FinFET) is investigated by using the 3-D statistical simulation. Then the substantial influence of its narrowest width of the JL-FinFET is defined and presented. The results show that JL-FinFET is more sensitive to LER than inversion-mode FinFET. Further, the performance including the threshold voltage and on-state current is observed to be determined by the narrowest width of channel. The narrower channel has smaller on-state current and larger threshold voltage. The variations of on-state current caused by LER increase as the place of the narrowest channel width moving from drain to source. These imply that it is important to reduce the LER near the source side to suppress performance variations.
- Published
- 2015
- Full Text
- View/download PDF
38. A genetic algorithm based method for the uniformity of power in SoC during dynamic burn-in
- Author
-
Yifan Zhang, Xinnan Lin, Fu Sun, Hong Li, and Xiaole Cui
- Subjects
Computer Science::Hardware Architecture ,Engineering ,business.industry ,Burn-in ,Genetic algorithm ,Hardware_INTEGRATEDCIRCUITS ,Electronic engineering ,Hardware_PERFORMANCEANDRELIABILITY ,Chip ,business ,Circuit under test ,Test scheduling ,Power (physics) - Abstract
It is desirable for an uniform power distribution in the chip during the dynamic burn-in, in which stimuli are inputted into the circuit under test. This paper uses the genetic algorithm to get an optimized input order of burn-in patterns for IP cores to approximate the uniformity of the power distribution in the SoC under the constraints of peak power and TAM width. The experimental results shows that the proposed method is effective on power uniformity for the fixed-width TAM SoC.
- Published
- 2015
- Full Text
- View/download PDF
39. A 250MHz Programmable Gain Amplifier for low power UWB receivers
- Author
-
Xinnan Lin, Ying Xiao, Hao Wang, Binbin Li, and Xiaole Cui
- Subjects
Open-loop gain ,Programmable-gain amplifier ,Engineering ,Current consumption ,business.industry ,Electrical engineering ,Electronic engineering ,business ,Fully differential amplifier ,Power (physics) - Abstract
A power-optimized Programmable Gain Amplifier (PGA) for low power UWB receivers is presented. The PGA consists of a buffer and three gain cells which have additional input stages in parallel. By enhancing the current in additional input stage which is applied in programmed gain level, larger gain is acquired and the area cost is reduced theoretically at the same time. The PGA is programmable in the 0–40dB range with 5dB step and its 3dB bandwidth is greater than 250MHz. The current consumption (1.9mA at 0dB gain up to 2.5mA at 40dB gain) is optimized according to the selected gain level.
- Published
- 2015
- Full Text
- View/download PDF
40. A 0.8V CMOS bandgap voltage reference design
- Author
-
Yifan Zhang, Ying Xiao, Xinnan Lin, Bolun Zhang, Xiaole Cui, and Chun Yang
- Subjects
Power supply rejection ratio ,Engineering ,Bandgap voltage reference ,business.industry ,Voltage divider ,Electrical engineering ,Line regulation ,law.invention ,law ,Operational amplifier ,Silicon bandgap temperature sensor ,business ,Low voltage ,Voltage reference - Abstract
A low-voltage bandgap reference implemented in circuit is optimized by adjusting the ratio of the resistors, and reducing the working voltage of operational amplifier. It achieves the performance of a temperature coefficient of 25 ppm/oC in the range of 0∼100"C which works under the voltage of 0.8V. The simulated power supply rejection ratio is 46.3dB @1Hz and the line regulation is 1.5mV/V in the range from 0.8V to 1.8V.
- Published
- 2015
- Full Text
- View/download PDF
41. Context-adaptive fast motion estimation of HEVC
- Author
-
Li Xufeng, Ronggang Wang, Xiaole Cui, and Wenmin Wang
- Subjects
Motion compensation ,business.industry ,Computer science ,Motion estimation ,ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION ,Computer vision ,Artificial intelligence ,business ,Motion vector ,Context-adaptive binary arithmetic coding ,Block-matching algorithm ,Quarter-pixel motion - Abstract
High Efficient Video Coding (HEVC) is the latest coding standard with superior compression efficiency while its encoding complexity is much higher compared with H.264/AVC. Motion estimation is one of the most time-consuming parts in video coding. In the reference software of HEVC, TZ (Test Zone) search method is adopted as the fast motion estimation method. However, its complexity is still high. There are many other fast motion estimation methods, for example, the hexagon search method, but their performance loss is larger than TZ search. In order to balance coding speed and performance, a new context-adaptive fast motion estimation algorithm is proposed in this paper. In this the proposed, motion intensity is defined in block-level, motion vectors and motion vector differences of neighbor blocks are utilized to measure the motion intensity. When motion intensity is large, TZ search method is used; otherwise, hexagon search method is used. Experimental results show that the proposed method can save 39% ∼ 60% of motion estimation time with average 0.5% of BD-rate loss.
- Published
- 2015
- Full Text
- View/download PDF
42. A low overhead DPA countermeasure of ECC based on randomized modular multiplication
- Author
-
Lifei Liu, Xiaole Cui, Chung Len Lee, Dongmei Xue, and Shijie Zhang
- Subjects
Power analysis ,Modular arithmetic ,business.industry ,Computer science ,Key space ,Embedded system ,Parallel computing ,Side channel attack ,Elliptic curve cryptography ,business ,Countermeasure (computer) ,Key size ,Power (physics) - Abstract
Elliptic Curve Cryptography is a popular algorithm since it can achieve good security level with a small key size. However, the ECC hardware is suffering from some side channel attacks, such as Differential power-analysis (DPA), which can retrieve secret keys by analyzing power consumption of the attacked devices. In this paper, a countermeasure to secure the modular multiplication, an important operation of Elliptic Curve Cryptography, with randomization method is studied. The experiment results show that unprotected device reveal the secret key within 1000 power traces, while the protected one can defend DPA attack with 105 power traces, with only 8% additional area cost.
- Published
- 2014
- Full Text
- View/download PDF
43. A Phase Change Memory SPICE model adaptable to different device geometry
- Author
-
Yan Liu, Xinnan Lin, Zhitang Song, Yiqun Wei, Yuefeng Gong, Xiaole Cui, and Xian Zheng
- Subjects
Phase-change memory ,Engineering ,Hardware_MEMORYSTRUCTURES ,business.industry ,Spice ,Electronic engineering ,Experimental data ,Geometry ,business ,Hardware_LOGICDESIGN - Abstract
A SPICE model of Phase Change Memory (PCM) is developed based on a proposed analytical resistance model, which enables the PCM circuit simulation adaptable to different device geometry for the first time. The model agrees with experimental data and results show it is able to predict device characteristics with different geometry.
- Published
- 2014
- Full Text
- View/download PDF
44. A 2.34–3.29GHz CMOS LC VCO with low phase noise and low power
- Author
-
Xiaole Cui, Zuolin Cheng, Hao Wang, and Chung Len Lee
- Subjects
Voltage-controlled oscillator ,Materials science ,Offset (computer science) ,CMOS ,business.industry ,Phase noise ,Electrical engineering ,Electronic engineering ,LC circuit ,Wideband ,business ,Active noise control - Abstract
A low phase noise wideband LC VCO is designed and presented. In this VCO, a symmetrical LC tank with proper arrangement of varactors is used to extend its tuning range. Results from the post layout simulation show that the VCO achieved a wide tuning range from 2.34GHz to 3.29GHz. Moreover, a noise cancellation technique is adopted to achieve better phase noise performance. The VCO exhibits that phase noise is lower than −120.1dBc/Hz at 1-MHz offset frequency. The circuit consumes 2.38mA of power from a 1.8V supply.
- Published
- 2014
- Full Text
- View/download PDF
45. Stacked Ge2Sb2Te5/GeTe multi-level phase-change memory with asymmetric double-heater
- Author
-
Haijun Lou, Xinnan Lin, Zhitang Song, Hu Xiaocheng, Xiaole Cui, and Yiqun Wei
- Subjects
Phase-change memory ,Barrier layer ,Materials science ,Computer simulation ,business.industry ,Interface (computing) ,Electrical engineering ,Optoelectronics ,Radius ,business ,Layer (electronics) - Abstract
An symmetric double-heater structure is proposed into the traditional stacked layer phase-change memory (PCM) for the first time. It contains no barrier layer. The superior multi-level storage (MLS) is verified in this structure by numerical simulation. Temperature at the interface of two phase-change materials is greatly reduced by reasonably choosing the heater radius, which is beneficial for less atomic interdiffusion at the interface, thus more stable MLS. Device performance can be optimized through material thickness trade-off. Hence, this structure is a candidate utility for the future MLS device
- Published
- 2014
- Full Text
- View/download PDF
46. Transition from junction limited to bulk limited subthreshold conduction in phase change memory
- Author
-
Song Zhitang, Mansun Chan, Bin Deng, Yiqun Wei, Dongyun Shen, Xiaole Cui, and Xinnan Lin
- Subjects
Phase-change memory ,Materials science ,Condensed matter physics ,Subthreshold conduction ,business.industry ,Electrode ,Electrical engineering ,Radius ,Current (fluid) ,business ,Thermal conduction ,Voltage ,Amorphous solid - Abstract
The impact of junction formed by the electrode and bulk in phase change memory to conduction at the amorphous high resistance state is studied in this paper. Analytical model deduced from basic physical equation elucidates that the current changes from junction barrier limited to bulk barrier limited when the applied voltage increases. The currents deduced from the model are in highly consistent with the measurement data at different temperatures. It is also found that the junction barrier becomes non-negligible when the radius of bottom electrode is scaled down to 20 nm.
- Published
- 2014
- Full Text
- View/download PDF
47. A test pattern selection method for dynamic burn-in of logic circuits based on ATPG technique
- Author
-
Chao Wang, Xuan Yang, Chung Len Lee, and Xiaole Cui
- Subjects
Engineering ,business.industry ,Reliability (computer networking) ,Hardware_PERFORMANCEANDRELIABILITY ,Automatic test pattern generation ,Power (physics) ,Computer Science::Hardware Architecture ,Logic gate ,Dynamic demand ,Burn-in ,Electronic engineering ,State (computer science) ,business ,Energy (signal processing) - Abstract
State transition of nodes in the circuit generates heat which usually needs to be minimized for reliability consideration. In this work, instead, the heat generated is used to burn-in the CUT. A burn-in test pattern selection technique based on the ATPG approach for maximizing the dynamic power of the CUT is proposed. Experimental results show that the technique is effective in selecting the patterns which offer maximal power. It can be applied into the burn-in of logic circuits and SoCs in an energy saving manner.
- Published
- 2013
- Full Text
- View/download PDF
48. New DfT architectures for 3D-SICs with a wireless test port
- Author
-
Chung Len Lee, Xiaole Cui, Xiaoxin Cui, Yibo He, and Yufeng Jin
- Subjects
Engineering ,Stack (abstract data type) ,business.industry ,Embedded system ,Wireless ,Port (circuit theory) ,business ,Computer hardware ,Test (assessment) - Abstract
This paper proposes two Design-for-Test (DfT) architectures for three-dimensional stacked ICs (3D-SICs) with a wireless test port. The two architectures use different test wrappers and TAMs, while the stack is partitioned into two subsets in both schemes. By testing the subsets simultaneously using the wired test port and the wireless test port, considerable test time can be saved. Optimization strategies of the two DfT architectures are discussed, and the total test time is estimated. Experimental results of both proposed optimal DfT architectures show that almost half of the total test time can be saved comparing with that of IEEE p1838 architecture.
- Published
- 2013
- Full Text
- View/download PDF
49. AHardware implementation of DES with combined countermeasure against DPA
- Author
-
Rui Li, Juan Gu, Xiaole Cui, Wei Wei, and Xiaoxin Cui
- Subjects
Masking (art) ,Engineering ,business.industry ,Hamming distance ,Cryptography ,Encryption ,Power analysis ,Countermeasure ,Embedded system ,Hardware_INTEGRATEDCIRCUITS ,Key (cryptography) ,ComputerSystemsOrganization_SPECIAL-PURPOSEANDAPPLICATION-BASEDSYSTEMS ,Side channel attack ,business ,Hardware_REGISTER-TRANSFER-LEVELIMPLEMENTATION - Abstract
Differential Power Analysis (DPA) reveals the secret key from the cryptographic device by side channel power leakage. Masking and Random Delay Insertion (RDI) are two countermeasures against DPA attack. But masking or RDI alone does not prevent DPA attack, they only enhance the difficulty of the attack. This paper proposes a novel countermeasure which associating masking with RDI. Furthermore, multi-masking instead of transformed masking is proposed in order to defend DPA attack based on hamming distance model. The combined countermeasure is implemented and verified on Data Encryption Standard (DES) algorithm. The results show that the combined countermeasure defends DPA attack with 105 power traces, and increases 40% ability against DPA with only 28% performance penalty.
- Published
- 2013
- Full Text
- View/download PDF
50. A folded current-reused CMOS power amplifier for low-voltage 3.0–5.0 GHz UWB applications
- Author
-
Xiaole Cui, Bo Wang, Chung Len Lee, Xiangrong Zhang, and Zhengyu Qian
- Subjects
Engineering ,business.industry ,Amplifier ,Transistor ,Electrical engineering ,Linearity ,Topology (electrical circuits) ,law.invention ,PMOS logic ,CMOS ,law ,Electronic engineering ,business ,Low voltage ,NMOS logic - Abstract
This paper proposes a low-voltage power amplifier for the 3.0–5.0 GHz ultra-wideband applications. Based on the classical current-reused technique, it adopts a folded topology to achieve the low-voltage working with acceptable output linearity. Its two-stage amplifying configuration consists of only one NMOS and one PMOS transistors. Implemented in the 0.18 µm CMOS technology, it obtains a gain as high as 16 dB with only ±0.5 dB flatness over the full working band, and consumes only 23.2 mW with 0.75mm2 size under 1.2 V.
- Published
- 2013
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.