IP / SOC Products Articles
-
Why a True Hardware PUF is more Reliable as RoT (Jul. 02, 2020)
In line with the theme of security, this article will highlight the importance of chip-security operations and the relationship between the root of trust and chip security. This paper will also analyze the advantages and disadvantages of “root of trust with software algorithms” and “root of trust for pure hardware” as the basis of chip security.
-
Analog and Power Management Trends in ASIC and SoC Designs (Jun. 29, 2020)
The design of modern Application Specific Integrated Circuits (ASICs) and Systems on a Chip (SoCs) in advanced process nodes can be differentiated by the on-die integration of analog functions, such as power management. Vidatronic offers this white paper to give some historical background on this trend and delve specifically into the integration of power management. Vidatronic IP solutions and the benefits they bring to ASIC and SoC designers are discussed.
-
The Quantum Tunneling Mechanism of NeoPUF (Jun. 22, 2020)
In this article, I will explain, in detail, the quantum-tunneling mechanism in the gate oxide of MOSFET in advanced silicon processes and how it applies in the creation of NeoPUF characteristics.
-
Specifying a PLL Part 1: Calculating PLL Clock Spur Requirements from ADC or DAC SFDR (Jun. 08, 2020)
In high end RF systems, such as 5G radios, the requirements are so stringent that the source of this strongest unwanted tone can be the PLL. This article outlines how spurs in the input clock to the ADC or DAC may limit the SFDR. This in turn will set the requirements for the spurs for the input clock (from a PLL), in order to achieve a specific SFDR.
-
Breaking new energy efficiency records with advanced power management platform (Jun. 08, 2020)
The free lunch offered for decades by Moore’s law is now over and scaling down to the next technology node no longer offers the required energy efficiency gains. Design teams must now pursue their gains by deploying increasingly complex power management techniques to meet the demands of the new IoT markets.
-
Time-Domain Analog Design: Why and How (Jun. 01, 2020)
The widespread adoption of scaled CMOS process technologies has made battery-operated consumer devices more powerful, cheaper, and last longer. In the last two decades, CMOS technology scaling has resulted in orders of magnitude reduction in transistor sizes, from 90nm in 2004 to 7nm in 2019 and 3nm in 2024.
-
Accelerating 5G virtual RAN deployment (May. 25, 2020)
This whitepaper provides an overview of the O-RAN Alliance and the value provided by O-RAN to the carrier industry along with a brief introduction to Comcores, our O-RAN solutions and our role in the O-RAN eco-system.
-
Why Do We Need SERDES? (May. 25, 2020)
Despite their design and verification complexity, SERDES have become an indispensable part of an SoC block. With SERDES IP blocks now available, it’s helped mitigate any cost, risk, and time-to-market escalation.
-
RoT: The Foundation of Security (May. 18, 2020)
The goal of this white paper is to provide a primer introduction to RoT and how to choose a right RoT as the trust anchor for a novel hardware based security architecture
-
5 Tips for Creating a Custom ASIC (May. 05, 2020)
Custom application-specific ICs (ASICs) can help OEMs significantly cut the cost of overly specified products and streamline bill of materials management. As more and more companies take this route for their designs, here are some key tips to consider when navigating the custom ASIC path.
-
Build Trust in Silicon: A Myth or a Reality? (May. 04, 2020)
Currently, there is a strong belief among the cyber security experts that hardware security is imperative since it is more efficient, effective, reliable and tamper-resistant than software security. As a matter of fact, providing trusted execution environment (TEE) and embedding a hardware root of trust (HRoT) as the anchor are necessary to provide a firm foundation for electronic systems security.
-
Why Software is Critical for AI Inference Accelerators (Apr. 27, 2020)
-
SRAM PUF: A Closer Look at the Most Reliable and Most Secure PUF (Apr. 06, 2020)
A recent article on the reliability of SRAM PUFs as a security mechanism for connected devices raised points worthy of discussion. Certainly, in today’s ever-more-connected world of the internet of things (IoT) and proliferating 5G networks, hardware-based security is more important than ever. So, if you’re looking for a way to secure a connected device, how do you evaluate the security and reliability of the various options available?
-
NeoPUF, A Reliable and Non-traceable Quantum Tunneling PUF (Mar. 30, 2020)
PUF stands for “Physically Unclonable Function” and is a physically derived “fingerprint” that serves as a unique identity for semiconductor devices. Their properties depend on the uniqueness and randomness of the physical factors induced during the manufacturing stage of a chip. T
-
Understanding Physical Unclonable Function (PUF) (Mar. 23, 2020)
A growing number of ASICs, microcontrollers and SoCs embed hardware cryptographic accelerators or software cryptographic libraries. The emergence of the Internet of Things (IoT) will call for an even faster adoption. We now can talk about cryptography pervasion.
-
Shift Power Reduction Methods and Effectiveness for Testability in ASIC (Mar. 16, 2020)
The purpose of this article is to highlight the different methodologies to reduce power consumption during ASIC manufacture testing. It distinguishes the different architectures & methodologies to optimize power consumption during a test mode of the design with implementation. There are number of techniques to reduce power consumption with different EDA tools available in the industry.
-
Testing Embedded MRAM IP for SoCs (Mar. 02, 2020)
With momentum building for Spin Transfer Torque MRAM (STT-MRAM) as the leading flavor of embedded MRAM technology, this white paper focuses on unique test challenges for STT-MRAM on-chip memory while considering needs for automotive applications.
-
SRAM PUF is Increasingly Vulnerable (Feb. 19, 2020)
As semiconductor technology advances, SRAM is becoming outmoded as a reliable PUF security solution.
-
Layout versus Schematic (LVS) Debug (Feb. 10, 2020)
In ASIC physical implementation, once layout is generated, it must follow all the design rules for successful manufacturing and must match the schematic of the required design. To ensure this in physical verification, Design Rule Check (DRC) is carried out to check whether the layout follows the rules for fault-less manufacturing or not.
-
Choosing the Right IP for Die-to-Die Connectivity (Feb. 03, 2020)
Higher data rates and more complex functionalities are increasing the SoC size for hyperscale data center, AI, and networking applications.
-
Securing Smart Connected Homes with OTP NVM (Jan. 06, 2020)
The market for piracy is huge and hackers have become increasingly sophisticated even when security is implemented in hardware. The race between the aggressors and protectors is a battle without end. Smart connected home devices are increasingly storing and processing very sensitive and private user data in addition to attempting to deliver copyright protected content from service providers. Protecting consumer data is vital.
-
Why the Memory Subsystem is Critical in Inferencing Chips (Dec. 23, 2019)
The number of new inferencing chip companies announced this past year is enough to make your head spin. With so many chips and no lack of any quality benchmarks, the industry often forgets one extremely critical piece: the memory subsystem. The truth is, you can’t have a good inference chip unless you have a good memory subsystem.
-
Enabling security in embedded system using M.2 SSD (Dec. 16, 2019)
Storage technologies are evolving at a high speed, thanks to new generations of memories such as Nandflash, ReRAM, MRAM and other flavors. That leads in an incredible performance increase in term of bandwidth and latency. By the way, security and data privacy features are still an important feature for critical storage systems.
-
Formal-based methodology cuts digital design IP verification time (Dec. 11, 2019)
Changing your methods of performing verification can reduce verification time by several weeks.
-
Internal JTAG - A cutting-edge solution for embedded instrument testing in SoC: Part 1 (Dec. 09, 2019)
This article is divided into two parts. The first part outlines the important features of the IJTAG use model, while the latter part describes a network interface, its architecture, and how it addresses the major challenges of the SoC test.
-
Pyramid Vector Quantization and Bit Level Sparsity in Weights for Efficient Neural Networks Inference (Nov. 28, 2019)
This paper discusses three basic blocks for the inference of convolutional neural networks (CNNs). Pyramid Vector Quantization (PVQ) is discussed as an effective quantizer for CNNs weights resulting in highly sparse and compressible networks. Properties of PVQ are exploited for the elimination of multipliers during inference while maintaining high performance. The result is then extended to any other quantized weights. The Tiny Yolo v3 CNN is used to compare such basic blocks.
-
Enabling Bluetooth Out-of-Band pairing through NFC (Nov. 18, 2019)
Many services offered over Bluetooth can expose private data or let a connecting party control the Bluetooth device. Security reasons make it necessary to recognize specific devices, and thus enable control over which devices can connect to a given Bluetooth device.
-
Advantages and Challenges of Designing with Multiple Inferencing Chips (Nov. 14, 2019)
Using multiple inferencing chips can deliver significant improvements in performance, but only when the neural network is designed correctly
-
Towards Self-Driving Cars: MIPI D-PHY Enabling Advanced Automotive Applications (Nov. 05, 2019)
Since the invention of the automobile well over a century ago, car manufacturers have been focused on creating the highest-speed, safest, and most fuel-efficient cars possible.
-
SamurAI: a 1.7MOPS-36GOPS Adaptive Versatile IoT Node with 15,000x Peak-to- Idle Power Reduction, 207ns Wake-up Time and 1.3TOPS/W ML Efficiency (Jun. 22, 1998)
This paper presents a versatile IoT node covering this gap in processing and energy by leveraging two on-chip sub-systems: a low power, clock-less, event-driven Always-Responsive (AR) part and an energy-efficient On- Demand (OD) part.