scispace - formally typeset
J

Jawad Haj-Yahya

Researcher at ETH Zurich

Publications -  25
Citations -  195

Jawad Haj-Yahya is an academic researcher from ETH Zurich. The author has contributed to research in topics: Power management & Compiler. The author has an hindex of 7, co-authored 24 publications receiving 119 citations. Previous affiliations of Jawad Haj-Yahya include Agency for Science, Technology and Research & Nanyang Technological University.

Papers
More filters
Proceedings ArticleDOI

A New High Throughput and Area Efficient SHA-3 Implementation

TL;DR: The presented SHA-3 hash implementations employed architectural optimization approaches based on the concepts of unrolling, pipelining and subpipelining which produced a total of five implementations ofSHA-3 which are denoted as Cases I-V in both FPGA and ASIC.
Proceedings ArticleDOI

Lightweight Secure-Boot Architecture for RISC-V System-on-Chip

TL;DR: A lightweight hardware-based secure boot architecture that incorporates an optimized Physical Unclonable Function (PUF) for providing keys to the security blocks of the System on Chip (SoC), among which, secure boot and remote attestation are presented.
Proceedings ArticleDOI

Techniques for Reducing the Connected-Standby Energy Consumption of Mobile Devices

TL;DR: This work proposes the optimized-deepest-runtime-idle-power state (ODRIPS), a mechanism that dynamically offloads the monitoring of wake-up events to low-power off-chip circuitry, which reduces the platform average power consumption in connected-standby mode by 22%.
Proceedings ArticleDOI

SysScale: exploiting multi-domain dynamic voltage and frequency scaling for energy efficient mobile processors

TL;DR: SysScale as mentioned in this paper proposes a new multi-domain power management technique to improve the energy efficiency of mobile system-on-chip (SoC): compute, IO, and memory domains.
Proceedings ArticleDOI

ITUS: A Secure RISC-V System-on-Chip

TL;DR: The design principles of ITUS 1, a secure SoC based on RISC-V architecture, are reported and a systematic overview of various design and automation efforts towards achieving SoC security is presented.