The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Quantum cryptography is the only system for key generation that can provably not be tampered by an eavesdropper without being noticed. While its theoretical basis is already reasonably well understood, commercial application is hampered by the lack of ready-to-use embedded encryption systems. In this paper we will describe our hardware solution, developed for setting up an application oriented quantum...
Hardware Trojans have emerged as a serious threat the past years. Several methods to detect possible hardware Trojans have been published, most of them aiming at detection during post-fabrication tests. Nevertheless, hardware Trojans are more probable to be inserted at design-level, as resources required to do so are much lower than those at fabrication. At design-level, verification methods have...
This paper addresses the potential danger using integrated circuits which contain malicious hardware modifications hidden in the silicon structure. A so called hardware Trojan may be added at several stages of the chip development process. This work concentrates on formal hardware Trojan detection during the design phase and highlights applied verification techniques. Selected methods are discussed...
This work addresses the increasing danger of shipping integrated circuits (either fully digital or mixed signal) that contain malicious hardware modifications. Potential security threads are established by so called hardware Trojans, implemented in the physical silicon structure. A desire of system engineers is to identify such back-door functionalities during an early design phase. The paper discusses...
Co-simulation provides an architect or a designer the freedom to change the implementation of a sub-module and analyse the design. Variational analysis during design procedure is an important tool to ensure higher-yield during production. State of the art co-simulators uses Monte Carlo analysis method for variational analysis, which is a multi-run method, slow and outcomes are not completely covered...
This paper describes a calculation framework for the simulation of systems being affected by parameter deviations. These unpredictable factors are described with the help of affine arithmetic noise symbols in the modeling domain. Methods for a semi-symbolic output signal calculation containing linear and nonlinear operators must be provided. For a nonlinear composition of two affine arithmetic forms...
Low power consumption or high execution speed is achieved by making an application specific design. However, today's systems also require flexibility in order to allow running similar or updated applications (e.g. due to changing standards). Finding a good trade-off between reconfigurability and performance is a challenge. This paper presents a tool that analyzes a given set of applications (as netlists)...
This paper describes a novel method to verify typical properties of systems with parameter deviations. These parameter deviations have an impact on a system behavior causing it to deviate from its ideal behavior. The concept of Affine Arithmetic is used to model typical errors and uncertainties in today's analog-mixed signal systems. The method which is proposed is a combination of assertions and...
In case of architectural designing of an analog system/sub-system, accurate and sufficient estimation of non-idealistic parameters are of highest importance as it impacts strongly on the cost and performance of the target implementation. Manual optimization of such a system which is a multi-dimensional complex design-space, is prone to manual errors, limited by human imaginations and should be avoided...
Range based system simulations are increasingly preferred in recent years to cope with the performance issues inherent with standard multi-run simulations. Traditionally, deviations of nominal system parameters are considered statistically by steadily varying the system parameters and simulating all of these parameter space realizations in multiple simulation runs. In range based or semi-symbolic...
In recent times, range based modeling and simulation techniques have emerged for systems with parameter tolerances and deviations. They are used to perform a semi-symbolic simulation and to analyze the examined systems for their time domain behavior. The system quantities in such simulations are represented as range based signals using the concept of Affine Arithmetic. Transforming the range based...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.