scispace - formally typeset
Search or ask a question

Showing papers by "Kaisheng Ma published in 2013"


Proceedings ArticleDOI
Xiaoxin Cui1, Kaisheng Ma1, Kai Liao1, Nan Liao1, Di Wu1, Wei Wei1, Rui Li1, Dunshan Yu1 
19 May 2013
TL;DR: The experimental and simulation result shows that the leakage power dissipation reduced greatly when circuits operate at the lower frequency, and the energy-delay product of FinFET circuits is reduced by 30% approximately.
Abstract: In this paper, a novel device/circuit co-design scheme, namely Dynamic-Adjusting Threshold-Voltage Scheme (DATS) for independent-gate mode FinFET circuits has been proposed. The main idea of this scheme is that a pair of back-gate bias of FinFETs is adjusted dynamically to change threshold voltage according to the system operating frequency and operating mode, which could optimize circuit power, especially leakage power. The experimental and simulation result shows that the leakage power dissipation reduced greatly when circuits operate at the lower frequency, and the energy-delay product of FinFET circuits is reduced by 30% approximately.

10 citations


Journal ArticleDOI
TL;DR: The results evince the proposed FinFET adiabatic circuits have a considerable reduction of power consumption compared with the bulk MOSFET ones and have higher limiting frequency of clock source and better noise immunity.
Abstract: With the technology scaling down, leakage power becomes an important part of total power consumption. The relatively large leakage current weakens the energy recovery capability of adiabatic circuits and reduces its superiority, compared with static CMOS circuits in the field of low-power design. In this paper, we rebuild three types of adiabatic circuits (2N2N2P, IPAL and DCPAL) based on FinFET devices to obtain a large leakage power reduction by rationally utilizing the different operating modes of FinFET devices (SG, LP, and IG). A 16-bit adiabatic adder has been investigated to demonstrate the advantages of FinFET adiabatic circuits. The Predictive Technology Model (PTM) is used for 32-nm bulk MOSFET and FinFET devices and all of the simulations are based on HSPICE. The results evince the proposed FinFET adiabatic circuits have a considerable reduction (more than 60% for SG mode FinFET and more than 80% for LP mode FinFET) of power consumption compared with the bulk MOSFET ones. Furthermore, the FinFET adiabatic circuits also have higher limiting frequency of clock source and better noise immunity.

5 citations


Journal ArticleDOI
TL;DR: Software simulation and hardware implementation results show that the proposed scheme can not only improve the definition of the reconstructed image but also accelerate the reconstruction.
Abstract: The weight calculation in an iterative algorithm is the most computationally costly task in computed tomography image reconstruction. In this letter, a fast algorithm to speed up the weight calculation is proposed. The classic square pixel rotation approximate calculation method for computing the weights in the iterative algorithm is first analyzed and then improved by replacing the square pixel model with a circular pixel model and the square rotation approximation with a segmentation method of a circular area. Software simulation and hardware implementation results show that our proposed scheme can not only improve the definition of the reconstructed image but also accelerate the reconstruction.

2 citations


Proceedings ArticleDOI
Rui Li1, Xiaoxin Cui1, Wei Wei1, Di Wu1, Kai Liao1, Nan Liao1, Kaisheng Ma1, Yu Dunshan1, Xiaole Cui1 
03 Jun 2013
TL;DR: A novel countermeasure associating masking with RDI is proposed, further, Multi-Masking instead of Transformed Masking is proposed in order to defend DPA attack based on hamming distance model.
Abstract: Differential Power Analysis (DPA) reveals the secret key from the cryptographic device by side channel power leakage Masking and Random Delay Insertion (RDI) are two effective countermeasures against DPA attack This paper propose a novel countermeasure which associating masking with RDI, further, Multi-Masking instead of Transformed Masking is proposed in order to defend DPA attack based on hamming distance model The combined countermeasure is implemented on Data Encryption Standard (DES) The results show that combined countermeasure defends DPA attack with 105 power traces, and increases 40% ability against DPA

1 citations