Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- 8-bit AES (1)
- AES register renaming (1)
- Anti-counterfeiting (1)
- Arithmetic circuits (1)
- Arithmetic constraints (1)
-
- Biomedical (1)
- Blockchain (1)
- Camouflaging (1)
- Computer Algebra (1)
- Computer algebra (1)
- CounterFoil (1)
- Divider verification (1)
- FPGA (1)
- Formal Verification (1)
- Formal verification (1)
- Groebner Basis (1)
- Hardware Monitoring (1)
- Hardware Security (1)
- ISFET (1)
- Internet of Things (1)
- Lightweight AES (1)
- Logic debugging (1)
- Low power AES (1)
- Obfuscation (1)
- On-Chip Processor (1)
- PH Sensor (1)
- PUF (1)
- Package Identification (1)
- Portable (1)
- Readout Circuits (1)
Articles 1 - 6 of 6
Full-Text Articles in Engineering
Design And Implementation Of An Isfet Sensor With Integration Of An On-Chip Processor, Shaghayegh Aslanzadeh
Design And Implementation Of An Isfet Sensor With Integration Of An On-Chip Processor, Shaghayegh Aslanzadeh
Doctoral Dissertations
Portable sensors are used in many applications. Among them, pH sensors are suitable for quantifying and identifying various analytes in real-time and doing so non-invasively. The analytes may have environmental impact such as in water quality monitoring. The analytes may also have biological impact such as monitoring cell culture or remote patient health assessment. CMOS based sensors are compact and enable low power consumption suitable for these portable applications.
This work reports on the development of a portable CMOS based pH sensor. The contributions of this dissertation are as follows. First, a differential pH sensor, with two different sized electrodes …
Formal Verification Of Divider And Square-Root Arithmetic Circuits Using Computer Algebra Methods, Atif Yasin
Formal Verification Of Divider And Square-Root Arithmetic Circuits Using Computer Algebra Methods, Atif Yasin
Doctoral Dissertations
A considerable progress has been made in recent years in verification of arithmetic circuits such as multipliers, fused multiply-adders, multiply-accumulate, and other components of arithmetic datapaths, both in integer and finite field domain. However, the verification of hardware dividers and square-root functions have received only a limited attention from the verification community, with a notable exception for theorem provers and other inductive, non-automated systems. Division, square root, and transcendental functions are all tied to the basic Intel architecture and proving correctness of such algorithms is of grave importance. Although belonging to the same iterative-subtract class of architectures, they widely differ …
Analysis And Verification Of Arithmetic Circuits Using Computer Algebra Approach, Tiankai Su
Analysis And Verification Of Arithmetic Circuits Using Computer Algebra Approach, Tiankai Su
Doctoral Dissertations
Despite a considerable progress in verification of random and control logic, advances in formal verification of arithmetic designs have been lagging. This can be attributed mostly to the difficulty of efficient modeling of arithmetic circuits and data paths without resorting to computationally expensive Boolean methods, such as Binary Decision Diagrams (BDDs) and Boolean Satisfiability (SAT) that require ``bit blasting'', i.e., flattening the design to a bit-level netlist. Similarly, approaches that rely on computer algebra and Satisfiability Modulo Theories (SMT) methods are either too abstract to handle the bit-level complexity of arithmetic designs or require solving computationally expensive decision or satisfiability …
Trustworthy Systems And Protocols For The Internet Of Things, Arman Pouraghily
Trustworthy Systems And Protocols For The Internet Of Things, Arman Pouraghily
Doctoral Dissertations
Processor-based embedded systems are integrated into many aspects of everyday life such as industrial control, automotive systems, healthcare, the Internet of Things, etc. As Moore’s law progresses, these embedded systems have moved from simple microcontrollers to full-scale embedded computing systems with multiple processor cores and operating systems support. At the same time, the security of these devices has also become a key concern. Our main focus in this work is the security and privacy of the embedded systems used in IoT systems. In the first part of this work, we take a look at the security of embedded systems from …
Design Of Hardware With Quantifiable Security Against Reverse Engineering, Shahrzad Keshavarz
Design Of Hardware With Quantifiable Security Against Reverse Engineering, Shahrzad Keshavarz
Doctoral Dissertations
Semiconductors are a 412 billion dollar industry and integrated circuits take on important roles in human life, from everyday use in smart-devices to critical applications like healthcare and aviation. Saving today's hardware systems from attackers can be a huge concern considering the budget spent on designing these chips and the sensitive information they may contain. In particular, after fabrication, the chip can be subject to a malicious reverse engineer that tries to invasively figure out the function of the chip or other sensitive data. Subsequent to an attack, a system can be subject to cloning, counterfeiting, or IP theft. This …
Efficient Hardware Primitives For Securing Lightweight Systems, Siva Nishok Dhanuskodi
Efficient Hardware Primitives For Securing Lightweight Systems, Siva Nishok Dhanuskodi
Doctoral Dissertations
In the era of IoT and ubiquitous computing, the collection and communication of sensitive data is increasingly being handled by lightweight Integrated Circuits. Efficient hardware implementations of crytographic primitives for resource constrained applications have become critical, especially block ciphers which perform fundamental operations such as encryption, decryption, and even hashing. We study the efficiency of block ciphers under different implementation styles. For low latency applications that use unrolled block cipher implementations, we design a glitch filter to reduce energy consumption. For lightweight applications, we design a novel architecture for the widely used AES cipher. The design eliminates inefficiencies in data …