2005 IEEE International Conference on Microelectronic Systems Education (MSE'05)
DOI: 10.1109/mse.2005.9
|View full text |Cite
|
Sign up to set email alerts
|

A Manual on ASIC Front to Back End Design Flow

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Publication Types

Select...
2
2
2

Relationship

0
6

Authors

Journals

citations
Cited by 11 publications
(3 citation statements)
references
References 0 publications
0
3
0
Order By: Relevance
“…DTA-PUF aims to jointly consider the inherent complexity of timing error manifestation with the intrinsic chip variations, proposing a new approach that inseparably intertwines PUF performance with dynamic error behaviour of pipelined cores. Our PUF implementation and evaluation rely on detailed post-layout gate-level simulation which is one of the most accurate, pre-fabrication steps of the standard ASIC flow used in industry [52]. Figure 3 shows the proposed PUF design for generating the challenge-response mechanism.…”
Section: Proposed Software Pufmentioning
confidence: 99%
See 1 more Smart Citation
“…DTA-PUF aims to jointly consider the inherent complexity of timing error manifestation with the intrinsic chip variations, proposing a new approach that inseparably intertwines PUF performance with dynamic error behaviour of pipelined cores. Our PUF implementation and evaluation rely on detailed post-layout gate-level simulation which is one of the most accurate, pre-fabrication steps of the standard ASIC flow used in industry [52]. Figure 3 shows the proposed PUF design for generating the challenge-response mechanism.…”
Section: Proposed Software Pufmentioning
confidence: 99%
“…(ns) It is important to note that such a technique does not provide a perfectly accurate representation of real hardware, however, it sufficiently reflects the actual timing behaviour of circuits after fabrication as recently indicated [37,64]. Nonetheless, such a delay representation is based on detailed post-layout gate-level simulation which is among the final steps of the typical ASIC design flow used in industry [52]. In general, in the IoT regime where million of devices are connected to the Internet, there is a need to address hardware security challenges and validate the effectiveness of security protocols at design cycle, i.e.…”
Section: Clock Periodmentioning
confidence: 99%
“…Most of the existing CaSeAs suffer from carry propagation in their internal RCA blocks, and few have area constraint problems. From the study of previous work on CaSeA, the cell regularity and uniform structure of the final design plays a vital role in the physical design of ASIC [20][21][22]. The back-end design can be made simpler with cell regularity concept [23,24], and [25].…”
Section: Introductionmentioning
confidence: 99%