Simulation and parameter optimization of polysilicon gate biaxial strained silicon MOSFETs
- Tsague, Hippolyte Djonon, Twala, Bhekisipho
- Authors: Tsague, Hippolyte Djonon , Twala, Bhekisipho
- Date: 2015
- Subjects: Cryptographic keys , Side channel , MOSFET , Biaxial , Strained , Silicon , Leakage currents , Sub-threshold voltage , Encryption
- Language: English
- Type: Conference proceedings
- Identifier: http://hdl.handle.net/10210/18137 , uj:15963 , Citation: Tsague, H.D. & Twala, B. 2015. Simulation and parameter optimization of polysilicon gate biaxial strained silicon MOSFETs. Fifth International Conference on Digital Information, Processing and Communications (ICDIPC2015), October 7-9, 2015, Sierre, Switzerland. p.38-43. ISBN: 978-1-4673-6832-2
- Description: Abstract: Although cryptography constitutes a considerable part of the overall security architecture for several use cases in embedded systems, cryptographic devices are still vulnerable to the diversity types of side channel attacks. Improvement in performance of Strained Silicon MOSFETs utilizing conventional device scaling has become more complex, because of the amount of physical limitations associated with the device miniaturization. Therefore, a great deal of attention has recently been paid to the mobility improvement technology through applying strain to CMOS channels. This paper reviews the characteristics of strained-Si CMOS with an emphasis on the mechanism of mobility enhancement due to strain. The device physics for improving the performance of MOSFETs is studied from the viewpoint of electronic states of carriers in inversion layers and, in particular, the sub-band structures. In addition, design and simulation of biaxial strained silicon NMOSFET (n-channel) is done using Silvaco’s Athena/Atlas simulator. From the results obtained, it became clear that biaxial strained silicon NMOS is one of the best alternatives to the current conventional MOSFET.
- Full Text:
- Authors: Tsague, Hippolyte Djonon , Twala, Bhekisipho
- Date: 2015
- Subjects: Cryptographic keys , Side channel , MOSFET , Biaxial , Strained , Silicon , Leakage currents , Sub-threshold voltage , Encryption
- Language: English
- Type: Conference proceedings
- Identifier: http://hdl.handle.net/10210/18137 , uj:15963 , Citation: Tsague, H.D. & Twala, B. 2015. Simulation and parameter optimization of polysilicon gate biaxial strained silicon MOSFETs. Fifth International Conference on Digital Information, Processing and Communications (ICDIPC2015), October 7-9, 2015, Sierre, Switzerland. p.38-43. ISBN: 978-1-4673-6832-2
- Description: Abstract: Although cryptography constitutes a considerable part of the overall security architecture for several use cases in embedded systems, cryptographic devices are still vulnerable to the diversity types of side channel attacks. Improvement in performance of Strained Silicon MOSFETs utilizing conventional device scaling has become more complex, because of the amount of physical limitations associated with the device miniaturization. Therefore, a great deal of attention has recently been paid to the mobility improvement technology through applying strain to CMOS channels. This paper reviews the characteristics of strained-Si CMOS with an emphasis on the mechanism of mobility enhancement due to strain. The device physics for improving the performance of MOSFETs is studied from the viewpoint of electronic states of carriers in inversion layers and, in particular, the sub-band structures. In addition, design and simulation of biaxial strained silicon NMOSFET (n-channel) is done using Silvaco’s Athena/Atlas simulator. From the results obtained, it became clear that biaxial strained silicon NMOS is one of the best alternatives to the current conventional MOSFET.
- Full Text:
Security in an Omni-Channel environment
- Naidoo, Karmen Natalie, Brink, Roelien
- Authors: Naidoo, Karmen Natalie , Brink, Roelien
- Date: 2017
- Subjects: Information security , Encryption , Omni-Channel
- Language: English
- Type: Conference proceedings
- Identifier: http://hdl.handle.net/10210/251774 , uj:26230 , Citation: Naidoo, K.N. & Brink, R. 2017. Security in an Omni-Channel environment.
- Description: Abstract: Omni-Channels ensure that customers have the same shopping experience online as they do in a physical store. Customers should be able to view products online and pay for them accordingly. Customers should also be assured that when they are paying for their items online, all their information is safe and secure. This study examines what organisations use to ensure that their customers private information remains safe at all times. Encryption, one time passwords, audit trails and various other components will be explored. The researcher will also investigate how all these components work together to ensure maximum protection of information at all times. A structured questionnaire was used to measure and rate the overall security features that are used to protect a customer when purchasing online. The results display the preferred features and functions for customers.
- Full Text:
- Authors: Naidoo, Karmen Natalie , Brink, Roelien
- Date: 2017
- Subjects: Information security , Encryption , Omni-Channel
- Language: English
- Type: Conference proceedings
- Identifier: http://hdl.handle.net/10210/251774 , uj:26230 , Citation: Naidoo, K.N. & Brink, R. 2017. Security in an Omni-Channel environment.
- Description: Abstract: Omni-Channels ensure that customers have the same shopping experience online as they do in a physical store. Customers should be able to view products online and pay for them accordingly. Customers should also be assured that when they are paying for their items online, all their information is safe and secure. This study examines what organisations use to ensure that their customers private information remains safe at all times. Encryption, one time passwords, audit trails and various other components will be explored. The researcher will also investigate how all these components work together to ensure maximum protection of information at all times. A structured questionnaire was used to measure and rate the overall security features that are used to protect a customer when purchasing online. The results display the preferred features and functions for customers.
- Full Text:
Assessment of encryption and decryption schemes for secure data transmission in healthcare systems
- Adedeji, Kazeem B., Nwulu, Nnamdi I., Aigbavboa, Clinton, Gbadamosi, Saheed L.
- Authors: Adedeji, Kazeem B. , Nwulu, Nnamdi I. , Aigbavboa, Clinton , Gbadamosi, Saheed L.
- Date: 2019
- Subjects: Data security , Decryption , Encryption
- Language: English
- Type: Conference proceedings
- Identifier: http://hdl.handle.net/10210/405247 , uj:34022 , Citation: Adedeji, K.B. et al. 2019. Assessment of encryption and decryption schemes for secure data transmission in healthcare systems.
- Description: Abstract: In the biomedical research community, transmitting a patient medical record via wireless means to an administrative centre or other medical centres is increasingly common. However, due to the open nature of wireless media, the security of such a system is a major concern, so, it is desirable to have a reliable security scheme. Amidst the numerous methods used to secure medical data, encryption schemes are becoming more popular due to their performance and relative simplicity. In this study, the performance of some data encryption and decryption schemes used to secure medical data is evaluated. These schemes are Blowfish, DES, AES, RC4, RSA, ECC, CBE, MTLM and CEC. The performance of these schemes was assessed through their execution time, throughput, average data rate and information entropy. For this performance assessment, some medical data were used for this task. The results showed that the performance of CBE, MTLM and CEC was better. CBE and MTLM offer a secure way to encrypt data with a significant reduction in the execution time. Moreover, if some of these schemes were combined to form a hybrid system, an enhancement in the security of medical data over wireless communication networks is guaranteed.
- Full Text:
- Authors: Adedeji, Kazeem B. , Nwulu, Nnamdi I. , Aigbavboa, Clinton , Gbadamosi, Saheed L.
- Date: 2019
- Subjects: Data security , Decryption , Encryption
- Language: English
- Type: Conference proceedings
- Identifier: http://hdl.handle.net/10210/405247 , uj:34022 , Citation: Adedeji, K.B. et al. 2019. Assessment of encryption and decryption schemes for secure data transmission in healthcare systems.
- Description: Abstract: In the biomedical research community, transmitting a patient medical record via wireless means to an administrative centre or other medical centres is increasingly common. However, due to the open nature of wireless media, the security of such a system is a major concern, so, it is desirable to have a reliable security scheme. Amidst the numerous methods used to secure medical data, encryption schemes are becoming more popular due to their performance and relative simplicity. In this study, the performance of some data encryption and decryption schemes used to secure medical data is evaluated. These schemes are Blowfish, DES, AES, RC4, RSA, ECC, CBE, MTLM and CEC. The performance of these schemes was assessed through their execution time, throughput, average data rate and information entropy. For this performance assessment, some medical data were used for this task. The results showed that the performance of CBE, MTLM and CEC was better. CBE and MTLM offer a secure way to encrypt data with a significant reduction in the execution time. Moreover, if some of these schemes were combined to form a hybrid system, an enhancement in the security of medical data over wireless communication networks is guaranteed.
- Full Text:
- «
- ‹
- 1
- ›
- »