Internet of Things (IoT) devices have strict energy constraints as they often operate on a battery supply. The cryptographic operations within IoT devices consume substantial energy and are vulnerable to a class of hardware attacks known as side-channel attacks. To reduce the energy consumption and defend against side-channel attacks, we propose combining adiabatic logic and Magnetic Tunnel Junctions to form our novel Energy Efficient-Adiabatic CMOS/MTJ Logic (EE-ACML). EE-ACML is shown to be both low energy and secure when compared to existing CMOS/MTJ architectures. EE-ACML reduces dynamic energy consumption with adiabatic logic, while MTJs reduce the leakage power of a circuit. To show practical functionality and energy savings, we desig...
Low-power circuits and issues associated with them have gained a significant amount of attention in ...
Existing secure adiabatic logic designs use charge sharing inputs to deliver input independent energ...
This thesis tackles the need for ultra-low power operation in power-constrained cryptographic comput...
Internet of Things (IoT) devices have strict energy constraints as they often operate on a battery s...
Internet of Things (IoT) is a collection of devices that exchange data through a network to implemen...
Internet of Things (IoT) is a collection of devices that exchange data through a network to implemen...
Internet of Things (IoT) is a collection of devices that exchange data through a network to implemen...
Designing energy-efficient and secure cryptographic circuits in low-frequency medical devices are ch...
Designing energy-efficient and secure cryptographic circuits in low-frequency medical devices are ch...
Designing energy-efficient and secure cryptographic circuits in low-frequency medical devices are ch...
Internet of Things (IoT) is a network of devices that are connected through the Internet to exchange...
Internet of Things (IoT) is a network of devices that are connected through the Internet to exchange...
The growing data-intensive applications that run on IoT edge devices require the circuit to be low-p...
In this paper, we propose a novel power analysis attack resilient adiabatic logic which, unlike exis...
The growing data-intensive applications that run on IoT edge devices require the circuit to be low-p...
Low-power circuits and issues associated with them have gained a significant amount of attention in ...
Existing secure adiabatic logic designs use charge sharing inputs to deliver input independent energ...
This thesis tackles the need for ultra-low power operation in power-constrained cryptographic comput...
Internet of Things (IoT) devices have strict energy constraints as they often operate on a battery s...
Internet of Things (IoT) is a collection of devices that exchange data through a network to implemen...
Internet of Things (IoT) is a collection of devices that exchange data through a network to implemen...
Internet of Things (IoT) is a collection of devices that exchange data through a network to implemen...
Designing energy-efficient and secure cryptographic circuits in low-frequency medical devices are ch...
Designing energy-efficient and secure cryptographic circuits in low-frequency medical devices are ch...
Designing energy-efficient and secure cryptographic circuits in low-frequency medical devices are ch...
Internet of Things (IoT) is a network of devices that are connected through the Internet to exchange...
Internet of Things (IoT) is a network of devices that are connected through the Internet to exchange...
The growing data-intensive applications that run on IoT edge devices require the circuit to be low-p...
In this paper, we propose a novel power analysis attack resilient adiabatic logic which, unlike exis...
The growing data-intensive applications that run on IoT edge devices require the circuit to be low-p...
Low-power circuits and issues associated with them have gained a significant amount of attention in ...
Existing secure adiabatic logic designs use charge sharing inputs to deliver input independent energ...
This thesis tackles the need for ultra-low power operation in power-constrained cryptographic comput...