Null Convention Logic Applications of Asynchronous Design in Nanotechnology and Cryptographic Security

Null Convention Logic Applications of Asynchronous Design in Nanotechnology and Cryptographic Security
Title Null Convention Logic Applications of Asynchronous Design in Nanotechnology and Cryptographic Security PDF eBook
Author Jun Wu (Ph.D.)
Publisher
Pages 0
Release 2012
Genre Asynchronous circuits
ISBN

Download Null Convention Logic Applications of Asynchronous Design in Nanotechnology and Cryptographic Security Book in PDF, Epub and Kindle

"This dissertation presents two Null Convention Logic (NCL) applications of asynchronous logic circuit design in nanotechnology and cryptographic security. The first application is the Asynchronous Nanowire Reconfigurable Crossbar Architecture (ANRCA); the second one is an asynchronous S-Box design for cryptographic system against Side-Channel Attacks (SCA). The following are the contributions of the first application: 1) Proposed a diode- and resistor-based ANRCA (DR-ANRCA). Three configurable logic block (CLB) structures were designed to efficiently reconfigure a given DR-PGMB as one of the 27 arbitrary NCL threshold gates. A hierarchical architecture was also proposed to implement the higher level logic that requires a large number of DR-PGMBs, such as multiple-bit NCL registers. 2) Proposed a memristor look-up-table based ANRCA (MLUT-ANRCA). An equivalent circuit simulation model has been presented in VHDL and simulated in Quartus II. Meanwhile, the comparison between these two ANRCAs have been analyzed numerically. 3) Presented the defect-tolerance and repair strategies for both DR-ANRCA and MLUT-ANRCA. The following are the contributions of the second application: 1) Designed an NCL based S-Box for Advanced Encryption Standard (AES). Functional verification has been done using Modelsim and Field-Programmable Gate Array (FPGA). 2) Implemented two different power analysis attacks on both NCL S-Box and conventional synchronous S-Box. 3) Developed a novel approach based on stochastic logics to enhance the resistance against DPA and CPA attacks. The functionality of the proposed design has been verified using an 8-bit AES S-box design. The effects of decision weight, bitstream length, and input repetition times on error rates have been also studied. Experimental results shows that the proposed approach enhances the resistance to against the CPA attack by successfully protecting the hidden key"--Abstract, leaf iii

Designing Asynchronous Circuits using NULL Convention Logic (NCL)

Designing Asynchronous Circuits using NULL Convention Logic (NCL)
Title Designing Asynchronous Circuits using NULL Convention Logic (NCL) PDF eBook
Author Scott Smith
Publisher Springer Nature
Pages 86
Release 2022-06-01
Genre Technology & Engineering
ISBN 3031798007

Download Designing Asynchronous Circuits using NULL Convention Logic (NCL) Book in PDF, Epub and Kindle

Designing Asynchronous Circuits using NULL Convention Logic (NCL) begins with an introduction to asynchronous (clockless) logic in general, and then focuses on delay-insensitive asynchronous logic design using the NCL paradigm. The book details design of input-complete and observable dual-rail and quad-rail combinational circuits, and then discusses implementation of sequential circuits, which require datapath feedback. Next, throughput optimization techniques are presented, including pipelining, embedding registration, early completion, and NULL cycle reduction. Subsequently, low-power design techniques, such as wavefront steering and Multi-Threshold CMOS (MTCMOS) for NCL, are discussed. The book culminates with a comprehensive design example of an optimized Greatest Common Divisor circuit. Readers should have prior knowledge of basic logic design concepts, such as Boolean algebra and Karnaugh maps. After studying this book, readers should have a good understanding of the differences between asynchronous and synchronous circuits, and should be able to design arbitrary NCL circuits, optimized for area, throughput, and power. Table of Contents: Introduction to Asynchronous Logic / Overview of NULL Convention Logic (NCL) / Combinational NCL Circuit Design / Sequential NCL Circuit Design / NCL Throughput Optimization / Low-Power NCL Design / Comprehensive NCL Design Example

Design and Characterization of Asynchronous Delay-insensitive Arithemetic Components Using NULL Conventional Logic

Design and Characterization of Asynchronous Delay-insensitive Arithemetic Components Using NULL Conventional Logic
Title Design and Characterization of Asynchronous Delay-insensitive Arithemetic Components Using NULL Conventional Logic PDF eBook
Author Satish Kumar Bandapati
Publisher
Pages 134
Release 2003
Genre Computer arithmetic and logic units
ISBN

Download Design and Characterization of Asynchronous Delay-insensitive Arithemetic Components Using NULL Conventional Logic Book in PDF, Epub and Kindle

"This thesis focuses on design and characterization of arithemetic circuits, such as multipliers and ALUs, using the asynchronous delay-insensitive NULL Convention Logic (NCL) paradigm. This work helps to build a library of reusable components to aid in the integration of asynchronous design paradigms, like NCL, into the semiconductor design industry."--Abstract, p. iii.

Applied Cryptography

Applied Cryptography
Title Applied Cryptography PDF eBook
Author Bruce Schneier
Publisher John Wiley & Sons
Pages 937
Release 2017-05-25
Genre Computers
ISBN 1119439027

Download Applied Cryptography Book in PDF, Epub and Kindle

From the world's most renowned security technologist, Bruce Schneier, this 20th Anniversary Edition is the most definitive reference on cryptography ever published and is the seminal work on cryptography. Cryptographic techniques have applications far beyond the obvious uses of encoding and decoding information. For developers who need to know about capabilities, such as digital signatures, that depend on cryptographic techniques, there's no better overview than Applied Cryptography, the definitive book on the subject. Bruce Schneier covers general classes of cryptographic protocols and then specific techniques, detailing the inner workings of real-world cryptographic algorithms including the Data Encryption Standard and RSA public-key cryptosystems. The book includes source-code listings and extensive advice on the practical aspects of cryptography implementation, such as the importance of generating truly random numbers and of keeping keys secure. ". . .the best introduction to cryptography I've ever seen. . . .The book the National Security Agency wanted never to be published. . . ." -Wired Magazine ". . .monumental . . . fascinating . . . comprehensive . . . the definitive work on cryptography for computer programmers . . ." -Dr. Dobb's Journal ". . .easily ranks as one of the most authoritative in its field." -PC Magazine The book details how programmers and electronic communications professionals can use cryptography-the technique of enciphering and deciphering messages-to maintain the privacy of computer data. It describes dozens of cryptography algorithms, gives practical advice on how to implement them into cryptographic software, and shows how they can be used to solve security problems. The book shows programmers who design computer applications, networks, and storage systems how they can build security into their software and systems. With a new Introduction by the author, this premium edition will be a keepsake for all those committed to computer and cyber security.

Hardware Protection through Obfuscation

Hardware Protection through Obfuscation
Title Hardware Protection through Obfuscation PDF eBook
Author Domenic Forte
Publisher Springer
Pages 352
Release 2017-01-02
Genre Technology & Engineering
ISBN 3319490192

Download Hardware Protection through Obfuscation Book in PDF, Epub and Kindle

This book introduces readers to various threats faced during design and fabrication by today’s integrated circuits (ICs) and systems. The authors discuss key issues, including illegal manufacturing of ICs or “IC Overproduction,” insertion of malicious circuits, referred as “Hardware Trojans”, which cause in-field chip/system malfunction, and reverse engineering and piracy of hardware intellectual property (IP). The authors provide a timely discussion of these threats, along with techniques for IC protection based on hardware obfuscation, which makes reverse-engineering an IC design infeasible for adversaries and untrusted parties with any reasonable amount of resources. This exhaustive study includes a review of the hardware obfuscation methods developed at each level of abstraction (RTL, gate, and layout) for conventional IC manufacturing, new forms of obfuscation for emerging integration strategies (split manufacturing, 2.5D ICs, and 3D ICs), and on-chip infrastructure needed for secure exchange of obfuscation keys- arguably the most critical element of hardware obfuscation.

Management Information Systems

Management Information Systems
Title Management Information Systems PDF eBook
Author Kenneth C. Laudon
Publisher Pearson Educación
Pages 618
Release 2004
Genre Business & Economics
ISBN 9789702605287

Download Management Information Systems Book in PDF, Epub and Kindle

Management Information Systems provides comprehensive and integrative coverage of essential new technologies, information system applications, and their impact on business models and managerial decision-making in an exciting and interactive manner. The twelfth edition focuses on the major changes that have been made in information technology over the past two years, and includes new opening, closing, and Interactive Session cases.

Bebop to the Boolean Boogie

Bebop to the Boolean Boogie
Title Bebop to the Boolean Boogie PDF eBook
Author Clive Maxfield
Publisher Newnes
Pages 567
Release 2008-12-05
Genre Technology & Engineering
ISBN 0080949509

Download Bebop to the Boolean Boogie Book in PDF, Epub and Kindle

This entertaining and readable book provides a solid, comprehensive introduction to contemporary electronics. It's not a "how-to-do" electronics book, but rather an in-depth explanation of how today's integrated circuits work, how they are designed and manufactured, and how they are put together into powerful and sophisticated electronic systems. In addition to the technical details, it's packed with practical information of interest and use to engineers and support personnel in the electronics industry. It even tells how to pronounce the alphabet soup of acronyms that runs rampant in the industry. Written in conversational, fun style that has generated a strong following for the author and sales of over 14,000 copies for the first two editions The Third Edition is even bigger and better, with lots of new material, illustrations, and an expanded glossary Ideal for training incoming engineers and technicians, and for people in marketing or other related fields or anyone else who needs to familiarize themselves with electronics terms and technology