The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Using SMD packages with high power dissipation is challenging. To cool the SMD power packages, the state of the art solution is to use a PCB with thermal vias to extract the heat from the electronic package [1]. This solution has the disadvantage that the thermal resistance from package to heatsink is relatively high, in the range of 5–10 K/W. A new solution for cooling is proposed, in which the heatsink...
Tamper detection circuits provide the first and most important defensive wall in protecting electronic modules containing security data. A widely used procedure is to cover the entire module with a foil containing fine conductive mesh, which detects intrusion attempts. Detection circuits are further classified as passive or active. Passive circuits have the advantage of low power consumption, however...
The use of COB (chip on board) LEDs in general lighting is increasing due to the favorable emitted light to source size ratio. COB LED's are compact, modular and provide a generally homogenous light. However, due to compactness, the power densities can be quite large and as such efficient cooling solutions must be found. Active cooling is an attractive solution; however it falls short of the required...
The automotive electronics needs to be designed to withstand a harsh electric environment (high transient pulses, electromagnetic interference), as described in [1][2] and [3]. Oftentimes the need arises to use an electronic circuit which was not design to operate, and might be even destroyed by automotive electric environment. A supply circuit was designed to allow the non-automotive compliant circuit...
This paper presents how to design and setup a Simple Power Analysis (SPA) attack and a Differential Power Analysis (DPA) attack on a smartcard and on a 32 bit microcontroller. SPA and DPA are power analysis attacks developed by Paul Kocher, Joshua Jaffe, and Benjamin Jun in 1995. These are non-invasive techniques which allow us to observe electrical patterns of different types of cryptographic algorithms,...
Using Finite Element Method this paper performs analysis over different type of magnetic core shapes from both electromagnetic and thermal perspectives. In this article,the planar transformer modeling and simulations intend to reveal the aspects that help the designer to choose between types of core shapes considering a more efficient use of copper, a better use of board space and an improved thermal...
Developing security products implies a great attention to every possible detail, from the design stage to the testing stage in order to obtain/create a good and secure product. It is well known that these products are most exposed to fault injection attacks. This paper describes a personalized True Random Number Generator, based on Ring Oscillators, implemented in FPGA logic, using a Zynq System on...
Random Number Generators are widely used in cryptographic applications (symmetric and asymmetric encryption, digital certificate generation, etc.) and other related areas. True Random Number Generators (TRNG) are based on physical non-deterministic phenomenon. Most of these generators are based on a large number of interconnected high frequency ring oscillators (RO), which are most commonly implemented...
The EDU-Factory — Learning Factories Alliance to Enhance Teaching in the field of Electronics Technology — project proposal was submitted to the Call: H2020-SEAC-2015-1, Topic: Innovative ways to make science education and scientific careers attractive to young people, as a Research and Innovation action, by the deadline of 16th Sep 2015. UPB-CETTI, the proposed coordinator brought together eleven...
Nowadays, due to the magnetic materials technology progress new design solutions are provided to engineers in order to develop new supply systems using power converters with high power density and high operating frequency. Planar magnetic structures have multiple advantages as compared to conventional wound technology, being used in supply systems that require low profile magnetic components and high...
True Random Numbers represents a sensitive research area for cryptographic algorithms and applications. They are mostly used in generating non-reproducible and non-deterministic patterns used in different cryptographic protocols. A True Random Number Generator basically consists of three main components: a noise generator, that is based on a physical incontrollable phenomenon, a randomness extractor...
Random numbers generators are widely used in different fields like cryptography, gaming development, artificial intelligence, etc. Being the engine of some security (cryptographic) protocols, the development of good and secure Random Number Generators aroused the attention of the research communities worldwide. Random Number Generators split into two categories: True Random Number Generators (based...
Micro heaters have particular applications in the gas sensor and the biotechnological field. The micro heaters are used to obtain the desired constant temperatures over the entire heating surface. Additionally the power consumption should be as low as possible. In this paper we present the electro-thermal characterization of a rectangular pattern mesh micro heater placed on a flexible substrate. Electrical...
LEDs generate visible light when current passes across the junction of the semiconductor chip. LEDs are not 100 % efficient; much of the power running through an LED is lost as heat, which thus needs to be evacuated. This paper made a comparison between a light fixture that uses Peltier element and a light fixture cooled by heat sink. This paper shows how the Peltier element can contribute to LEDs...
Following the cluster concept of triple helix introduced by Prof. Michael Porter, The Electronic Innovation Cluster was founded in 2011 as a result of the already existing economic relations between Center of Technological Electronics and Interconnection Techniques from the Politehnica University of Bucharest and several small and medium sized enterprises (SMEs) from the Bucharest-Ilfov region of...
Random numbers represent one of the most sensitive parts of cryptography, being used in different encryption algorithms and/or communication protocols for their property of being irreversible and non-deterministic. Usually, for an attacker, it is almost impossible to break by brute force the encryption algorithm of a secure communication. This is why they focus on breaking some of the consisting components,...
In this work, we carry out detailed investigations on the energy storage capability of a commercially available 10F/2.5V Suntan supercapacitor. For that, we make use of dedicated measurement methods and techniques: i.e., cyclic voltammetry, chronoamperometry, chronovoltametry and open circuit voltage. From cyclic voltammetry measurements, we show that the dependence of capacity on the applied voltage...
Random numbers represent one of the most sensible part of a cryptographic system, since the cryptographic keys must be entirely based on them. The security of a communication relies on the key that had been established between two users. If an attacker is able to deduce that key, the communication is compromised. This is why key generation must completely rely on random number generators, so that...
A True Random Number Generator (TRNG) is considered to be a pillar of cryptography. Designing a stable and secure TRNG has been and still is a major concern among researchers worldwide. The TRNG is basically based on a noise generator that is furthermore translated into bit streams. The most known TRNG are based on the Ring Oscillator's jitter property because of its simplicity in FPGA implementation...
This paper will describe a novel and secure communication protocol based on a hybrid System On Chip (FPGA Programmable Logic, plus Dual Core ARM Processing System) embedded architecture. Due to this System On Chip feature, the tasks for each component can be easily delimited, implemented and controllable. Taking in account the destination of the protocol: security and communication (which implies...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.