design automation
Recently Published Documents


TOTAL DOCUMENTS

1726
(FIVE YEARS 232)

H-INDEX

30
(FIVE YEARS 4)

Author(s):  
Seong Hyeon Hong ◽  
Jung-Il Shu ◽  
Junlin Ou ◽  
Yi Wang

2022 ◽  
Author(s):  
Marcel Walter ◽  
Robert Wille ◽  
Frank Sill Torres ◽  
Rolf Drechsler
Keyword(s):  

2021 ◽  
Author(s):  
Sergey Mescheryakov ◽  
Artem Groshev ◽  
Tatyana Skvortsova

The paper considers the modeling of radiation effects in design automation tools. Special at-tention is paid to the development of complex functional blocks and microelectronic products based on them, which require ensuring technological independence when creating modern control sys-tems, data processing and communication.


Author(s):  
David Knichel ◽  
Pascal Sasdrich ◽  
Amir Moradi

With an increasing number of mobile devices and their high accessibility, protecting the implementation of cryptographic functions in the presence of physical adversaries has become more relevant than ever. Over the last decade, a lion’s share of research in this area has been dedicated to developing countermeasures at an algorithmic level. Here, masking has proven to be a promising approach due to the possibility of formally proving the implementation’s security solely based on its algorithmic description by elegantly modeling the circuit behavior. Theoretically verifying the security of masked circuits becomes more and more challenging with increasing circuit complexity. This motivated the introduction of security notions that enable masking of single gates while still guaranteeing the security when the masked gates are composed. Systematic approaches to generate these masked gates – commonly referred to as gadgets – were restricted to very simple gates like 2-input AND gates. Simply substituting such small gates by a secure gadget usually leads to a large overhead in terms of fresh randomness and additional latency (register stages) being introduced to the design.In this work, we address these problems by presenting a generic framework to construct trivially composable and secure hardware gadgets for arbitrary vectorial Boolean functions, enabling the transformation of much larger sub-circuits into gadgets. In particular, we present a design methodology to generate first-order secure masked gadgets which is well-suited for integration into existing Electronic Design Automation (EDA) tools for automated hardware masking as only the Boolean function expression is required. Furthermore, we practically verify our findings by conducting several case studies and show that our methodology outperforms various other masking schemes in terms of introduced latency or fresh randomness – especially for large circuits.


2021 ◽  
pp. 927-934
Author(s):  
Paul Christoph Gembarski ◽  
Dörthe Behrens ◽  
Jan Feldkamp ◽  
Lorenz Kies ◽  
Lukas Hoppe

2021 ◽  
pp. 11-26
Author(s):  
Farzad Pour Rahimian ◽  
Jack Steven Goulding ◽  
Sepehr Abrishami ◽  
Saleh Seyedzadeh ◽  
Faris Elghaish

Sign in / Sign up

Export Citation Format

Share Document