- Low-power high-performance VLSI design
- Analog and Mixed-Signal Circuit Design
- Cryptographic Implementations and Security
- Embedded Systems Design Techniques
- Physical Unclonable Functions (PUFs) and Hardware Security
- Advancements in Semiconductor Devices and Circuit Design
- Experimental Learning in Engineering
- Chaos-based Image/Signal Encryption
- Parallel Computing and Optimization Techniques
- VLSI and Analog Circuit Testing
- VLSI and FPGA Design Techniques
- Semiconductor materials and devices
- Advancements in PLL and VCO Technologies
- Radiation Effects in Electronics
- Interconnection Networks and Systems
- Cellular Automata and Applications
- Advanced Malware Detection Techniques
- Coding theory and cryptography
- Advanced MEMS and NEMS Technologies
- Electromagnetic Compatibility and Noise Suppression
- Numerical Methods and Algorithms
- Media, Journalism, and Communication History
- Evolutionary Algorithms and Applications
- Sensor Technology and Measurement Systems
- Cinema History and Criticism
Instituto de Microelectrónica de Sevilla
2005-2024
Universidad de Sevilla
2011-2024
Instituto Politécnico Nacional
2015
Consejo Superior de Investigaciones Científicas
1997-2014
University of Illinois Chicago
2013
King Abdullah University of Science and Technology
2011-2013
Centro Nacional de Microelectrónica
1992-2002
Analogic (United States)
1993-2002
Unidades Centrales Científico-Técnicas
1997-2001
The study utilized a quasi-experimental design to evaluate the effectiveness of Alpha-Tap It Cards in improving alphabet knowledge among Ayta kindergarten learners at Bueno Integrated School Tarlac Province, Philippines. Twenty-five aged 5–6 years participated intervention, which involved pretests and posttests on letter recognition, sound identification, writing skills, analyzed as Consistent, Developing, Beginning levels. Cards, adapted from Alpabasa program, integrated visual, auditory,...
A delay model for static CMOS gates with application in gate level logic simulation is presented. It incorporates the degradation effect on narrow pulses and named PID (pure, inertial degradation). The results lead to conclusion that proposed new maintains high speed of gate-level a precision comparable electrical simulation.
A random number generator based on forcing metastable operation in a CMOS latch is presented. Sequences produced by this have passed standard tests, exhibiting reasonable behaviour.
Modular multiplication is the key operation in systems based on public encryption, both for RSA and elliptic curve (ECC) systems. High performance hardware implementations of ECC use Montgomery algorithm modular multiplication, since it allows results to be obtained without performing division operation. The aim this article explore various modified structures high speed implementation. We present implementation a with CSA different radix. In order optimize regarding speed, we considered...
Today, the large amount of information exchanged among various devices as well growth Internet Things (IoT) demand development that ensure secure communications, preventing malicious agents from tapping sensitive data. Indeed, security is one key challenges to address within IoT field. Due strong resource constraints in some applications, cryptographic algorithms affording lightweight implementations have been proposed. They constitute so-called cryptography. A prominent example Trivium...
This article presents the development of an experimental system to introduce faults in Trivium stream ciphers implemented on FPGA. The developed has made possible analyze vulnerability these implementations against fault attacks. consists a mechanism that injects small pulses clock signal, and elements if been introduced, number introduced its position inner state. results obtained demonstrate As far as we know, this is first time attack over are presented.
The integration of lightweight symmetric encryption is becoming increasingly widespread in very low-power Internet Things applications, with the rapid emergence low energy block and stream ciphers portable wireless systems. Trivium one shortlisted for hardware profile eSTREAM project. This paper describes multiradix implementations based on use parallelization techniques to reduce dynamic power consumption. designs were implemented characterized TSMC 90 nm compare area resources reduction....
This paper presents the design, simulation, fabrication and testing of novel, untethered SU-8 polymer microrobots based on scratch drive actuators (SDAs). The design consists two 100×120×10μm linked SDAs, individually operated close to their resonant frequencies. frequency deflection behavior an individual SDA can be controlled by its shape, thickness, stiffening features. As a result, paired SDAs actuated or simultaneously multifrequency driving signal, allowing for two-dimensional...
One of the best methods to improve security cryptographic systems used exchange sensitive information is attack them find their vulnerabilities and strengthen in subsequent designs. Trivium stream cipher one lightweight ciphers designed for applications Internet things (IoT). In this paper, we present a complete setup ASIC implementations which allows recovering secret keys using active non-invasive technique clock manipulation, combined with Differential Fault Analysis (DFA) cryptanalysis....
Differential-type structures to implement Boolean functions find very interesting applications in self-timed circuits. A novel structure of CMOS differential circuit called Switched Output Differential Structure (SODS) is presented this paper. This has been designed modifying the LOAD circuitry previously reported structures, gaining terms transistor-count and area. cell implemented on a standard 1.5 /spl mu/m technology served assess compare it with structures. Experimental laboratory...
The security of cryptocircuits is today threatened not only by attacks on algorithms but also, and above all, the circuit implementations themselves. These are known as side channel attacks. One variety Active Fault Analysis attack, that can make a vulnerable changing its behavior in certain way. This article presents an experimental fault insertion attack FPGA implementation Trivium stream cipher. It also compares faults introduced with expected after timing analysis. results show this to...
This paper presents the simulation of Scratch Drive Actuators (SDAs) for micro-robotic applications. SDAs use electrostatic forces to generate motion on top an interdigitated electrode array. The purpose this investigation is evaluate several design geometries and micro-actuator configurations using ConventorWare®'s finite element analysis module. study performed investigates modal behavior effects linking two or more together in a micro- robot device. In addition, array performance, used...
Summary This paper describes the use of parallelization techniques to reduce dynamic power consumption in hardware implementations Trivium stream cipher. is a synchronous cipher based on combination three non‐linear feedback shift registers. In 2008, it was chosen as finalist for profile eSTREAM project. So that their values can be compared and verified, proposed low‐power designs were implemented characterized 350‐nm standard‐cell technology with both transistors gate‐level models, order...
Random number generators (RNGs) based upon metastable operation in a CMOS latch are presented. Some different techniques to force and detect the final state also reported. Prototypes have been integrated sequences produced by these passed standard tests, exhibiting good random behavior.< <ETX xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">></ETX>
Attacks on cryptocircuits are becoming increasingly sophisticated, requiring designers to include more and countermeasures in the design protect it against malicious attacks. Fault Injection Differential Analysis have proven be very dangerous as they able retrieve secret information contained cryptocircuits. In this sense, Trivium cipher has been shown vulnerable type of attack. This paper presents four different fault detection schemes stream implementations injection attacks differential...
This paper presents HALOTIS, a novel high accuracy logic timing simulation tool, that incorporates new algorithm based on different concepts for transitions and events. is intended including the inertial degradation delay models. Simulation results are very similar to those obtained by electrical simulators, show higher compared conventional models implemented in current simulators.