نتایج جستجو برای: leakage simulation
تعداد نتایج: 587417 فیلتر نتایج به سال:
Cryptography hardware is vulnerable to side-channel (SC) attacks on power supply current flow and electromagnetic (EM) emission. This article proposes simulation-based EM leakage analysis (SCLA) techniques a cryptographic integrated circuit (IC) chip in system level assembly. SCLA measures SC metrics including T-score, score, the number of measurement traces disclosure, leveraged by secure syst...
The present study deals with a new method for measuring the power of a reactor. This method uses gamma and neutron radiation resulted from the entire reactor structure, without changing its structure (online). In terms of functionality, this method can measure the reactor power in real-time and report it instantly. In order to obtain the relationship between reactor power and gamma and neutron ...
Power is rapidly becoming the primary design constraint for systems ranging from server computers to handhelds. In this paper we study microarchitecture-level coupled power and thermal simulation considering dynamic and leakage power models with temperature and voltage scaling. We develop an accurate temperature-dependent leakage power model and efficient temperature calculation, and show that ...
In this proposed work we are applying valuable power gating schemes to FinFET based Schmitt trigger to enhance its performance by reducing the leakage current in standby mode (off-state mode). The power gating schemes like Sleep Transistor approach and Multi-Threshold CMOS (MTCMOS) and Double-Threshold CMOS (DTCMOS) have been analysed and simulated which shows the tremendous reduction in the le...
When international prices and foreign environmental policies are unaffected by domestic actions, carbon leakage is generated through the substitution of carbon-intensive domestic products with imports. This paper studies this “small open economy” leakage effect, using a numerical general equilibrium model of the Italian economy. The comparison of alternative simulation scenarios highlights that...
As an unsolved issue for embedded crypto solutions, side channel attacks are challenging the security of the Internet of things. Due to the advancement of chip technology, the nature of side channel leakage becomes hard to characterize with a fixed leakage model. In this work, a new non-linear collision attack is proposed in the pursuit of the side channel distinguishers with minimal assumption...
This paper presents a fast statistical static timing and leakage power analysis in Partially-Depleted Silicon-On-Insulator (PD-SOI) CMOS circuits in BSIMSOI3.2 100 nm technology. The proposed timing analysis considers floating body effect on the propagation delay for more accurate timing analysis in PD-SOI CMOS circuits. The accuracy of modeling the leakage power in PD-SOI CMOS circuits is impr...
In this paper, the novel “tapered-Vth” approach to design energy-efficient CMOS buffers is introduced. In this approach, the substantial energy consumption due to leakage is reduced by tapering the threshold voltage throughout the buffer stages, other than tapering the transistor size. More specifically, the threshold voltage is progressively reduced when going from the last to the first stage....
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید