Open Access. Powered by Scholars. Published by Universities.®
![Digital Commons Network](http://assets.bepress.com/20200205/img/dcn/DCsunburst.png)
VLSI and Circuits, Embedded and Hardware Systems Commons™
Open Access. Powered by Scholars. Published by Universities.®
Articles 1 - 2 of 2
Full-Text Articles in VLSI and Circuits, Embedded and Hardware Systems
Techniques Of Energy-Efficient Vlsi Chip Design For High-Performance Computing, Zhou Zhao
Techniques Of Energy-Efficient Vlsi Chip Design For High-Performance Computing, Zhou Zhao
LSU Doctoral Dissertations
How to implement quality computing with the limited power budget is the key factor to move very large scale integration (VLSI) chip design forward. This work introduces various techniques of low power VLSI design used for state of art computing. From the viewpoint of power supply, conventional in-chip voltage regulators based on analog blocks bring the large overhead of both power and area to computational chips. Motivated by this, a digital based switchable pin method to dynamically regulate power at low circuit cost has been proposed to make computing to be executed with a stable voltage supply. For one of …
Energy-Efficient And Secure Hardware For Internet Of Things (Iot) Devices, Dinesh Kumar Selvakumaran
Energy-Efficient And Secure Hardware For Internet Of Things (Iot) Devices, Dinesh Kumar Selvakumaran
Theses and Dissertations--Electrical and Computer Engineering
Internet of Things (IoT) is a network of devices that are connected through the Internet to exchange the data for intelligent applications. Though IoT devices provide several advantages to improve the quality of life, they also present challenges related to security. The security issues related to IoT devices include leakage of information through Differential Power Analysis (DPA) based side channel attacks, authentication, piracy, etc. DPA is a type of side-channel attack where the attacker monitors the power consumption of the device to guess the secret key stored in it. There are several countermeasures to overcome DPA attacks. However, most of …