Leakage and Leakage Sensitivity Computation for Combinational Circuits
نویسندگان
چکیده
منابع مشابه
Computing Leakage Current Distributions and Determination of Minimum Leakage Vectors for Combinational Designs
Computing Leakage Current Distributions and Determination of Minimum Leakage Vectors for Combinational Design. (May 2006) Kanupriya Gulati, B.E., University of Delhi Chair of Advisory Committee: Dr. Sunil Khatri Analyzing circuit leakage and minimizing leakage during the standby mode of operation of a circuit are important problems faced during contemporary circuit design. Analysis of the leaka...
متن کاملRobust Low-Leakage Circuits
Problem: While the aggressive scaling of CMOS technology to ever smaller dimensions has enabled higher performance and integration levels, it has given rise to a plethora of new problems in the design of integrated circuits [1-4]. Reduced threshold voltages and gate oxide thicknesses have caused an alarming increase in subthreshold source-drain leakage and gate leakage power dissipation in both...
متن کاملDPA Leakage Models for CMOS Logic Circuits
In this paper, we propose new models for directly evaluating DPA leakage from logic information in CMOS circuits. These models are based on the transition probability for each gate, and are naturally applicable to various actual devices for simulating power analysis. We also report the effectiveness of the previously known enhanced DPA on our model. Furthermore, we demonstrate the weakness of p...
متن کاملLeakage Control for Deep-Submicron Circuits
High leakage current in deep sub-micron regimes is becoming a significant contributor to power dissipation of CMOS circuits as threshold voltage, channel length, and gate oxide thickness are reduced. Consequently, leakage control and reduction are very important, especially for low power applications. The reduction in leakage current has to be achieved using both process and circuit level techn...
متن کاملSecuring Computation against Continuous Leakage
We present a general method to compile any cryptographic algorithm into one which resists side channel attacks of the only computation leaks information variety for an unbounded number of executions. Our method uses as a building block a semantically secure subsidiary bit encryption scheme with the following additional operations: key refreshing, oblivious generation of cipher texts, leakage re...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of Low Power Electronics
سال: 2005
ISSN: 1546-1998,0000-0000
DOI: 10.1166/jolpe.2005.026