Skip to main content

Showing 1–14 of 14 results for author: Dubrova, E

Searching in archive cs. Search in all archives.
.
  1. arXiv:1512.00274  [pdf, other

    cs.CR

    On Constructing Secure and Hardware-Efficient Invertible Map**s

    Authors: Elena Dubrova

    Abstract: Our society becomes increasingly dependent on wireless communications. The tremendous growth in the number and type of wirelessly connected devices in a combination with the drop** cost for performing cyberattacks create new challenges for assuring security of services and applications provided by the next generation of wireless communication networks. The situation is complicated even further b… ▽ More

    Submitted 11 February, 2016; v1 submitted 1 December, 2015; originally announced December 2015.

    Comments: 6 pages, 4 figures

  2. arXiv:1511.07792  [pdf, other

    cs.CR

    Two Countermeasures Against Hardware Trojans Exploiting Non-Zero Aliasing Probability of BIST

    Authors: Elena Dubrova, Mats Näslund, Gunnar Carlsson, John Fornehed, Ben Smeets

    Abstract: The threat of hardware Trojans has been widely recognized by academia, industry, and government agencies. A Trojan can compromise security of a system in spite of cryptographic protection. The damage caused by a Trojan may not be limited to a business or reputation, but could have a severe impact on public safety, national economy, or national security. An extremely stealthy way of implementing ha… ▽ More

    Submitted 24 November, 2015; originally announced November 2015.

    Comments: 16 pages, 5 figures

  3. arXiv:1503.06632  [pdf, other

    cs.DS

    A Fast Heuristic Algorithm for Redundancy Removal

    Authors: Maxim Teslenko, Elena Dubrova

    Abstract: Redundancy identification is an important step of the design flow that typically follows logic synthesis and optimization. In addition to reducing circuit area, power consumption, and delay, redundancy removal also improves testability. All commercially available synthesis tools include a redundancy removal engine which is often run multiple times on the same netlist during optimization. This pape… ▽ More

    Submitted 23 March, 2015; originally announced March 2015.

  4. arXiv:1503.04994  [pdf, other

    cs.DS

    A Linear-Time Algorithm for Finding All Double-Vertex Dominators of a Given Vertex

    Authors: Maxim Teslenko, Elena Dubrova

    Abstract: Dominators provide a general mechanism for identifying reconverging paths in graphs. This is useful for a number of applications in Computer-Aided Design (CAD) including signal probability computation in biased random simulation, switching activity estimation in power and noise analysis, and cut points identification in equivalence checking. However, traditional single-vertex dominators are too ra… ▽ More

    Submitted 17 March, 2015; originally announced March 2015.

  5. arXiv:1503.04628  [pdf, other

    cs.AR

    Logic BIST: State-of-the-Art and Open Problems

    Authors: Nan Li, Gunnar Carlsson, Elena Dubrova, Kim Petersen

    Abstract: Many believe that in-field hardware faults are too rare in practice to justify the need for Logic Built-In Self-Test (LBIST) in a design. Until now, LBIST was primarily used in safety-critical applications. However, this may change soon. First, even if costly methods like burn-in are applied, it is no longer possible to get rid of all latent defects in devices at leading-edge technology. Second, d… ▽ More

    Submitted 16 March, 2015; originally announced March 2015.

    Comments: 6 pages, 3 figures

  6. arXiv:1306.5596  [pdf, ps, other

    cs.IT

    An Algorithm for Constructing a Smallest Register with Non-Linear Update Generating a Given Binary Sequence

    Authors: Nan Li, Elena Dubrova

    Abstract: Registers with Non-Linear Update (RNLUs) are a generalization of Non-Linear Feedback Shift Registers (NLFSRs) in which both, feedback and feedforward, connections are allowed and no chain connection between the stages is required. In this paper, a new algorithm for constructing RNLUs generating a given binary sequence is presented. Expected size of RNLUs constructed by the presented algorithm is p… ▽ More

    Submitted 24 June, 2013; originally announced June 2013.

  7. arXiv:1302.6454  [pdf, other

    cs.OH

    Embedding of Deterministic Test Data for In-Field Testing

    Authors: Nan Li, Elena Dubrova

    Abstract: This paper presents a new feedback shift register-based method for embedding deterministic test patterns on-chip suitable for complementing conventional BIST techniques for in-field testing. Our experimental results on 8 real designs show that the presented approach outperforms the bit-flip** approach by 24.7% on average. We also show that it is possible to exploit the uneven distribution of don… ▽ More

    Submitted 23 January, 2013; originally announced February 2013.

  8. arXiv:1207.4017  [pdf, other

    cs.CR

    Ring Oscillator Physical Unclonable Function with Multi Level Supply Voltages

    Authors: Shohreh Sharif Mansouri, Elena Dubrova

    Abstract: One of the most common types of Physical Unclonable Functions (PUFs) is the ring oscillator PUF (RO-PUF), in which the output bits are obtained by comparing the oscillation frequencies of different ring oscillators. In this paper we design a new type of ring oscillator PUF in which the different inverters composing the ring oscillators can be supplied by different voltages. The new RO-PUF can be u… ▽ More

    Submitted 17 July, 2012; originally announced July 2012.

  9. arXiv:1108.3675  [pdf, ps, other

    cs.LO

    AIG Rewriting Using 5-Input Cuts

    Authors: Nan Li, Elena Dubrova

    Abstract: Rewriting is a common approach to logic optimization based on local transformations. Most commercially available logic synthesis tools include a rewriting engine that may be used multiple times on the same netlist during optimization. This paper presents an And-Inverter graph based rewriting algorithm using 5-input cuts. The best circuits are pre-computed for a subset of NPN classes of 5-variable… ▽ More

    Submitted 18 August, 2011; originally announced August 2011.

  10. arXiv:1105.4514  [pdf, ps, other

    cs.CR cs.IT

    Synthesis of Parallel Binary Machines

    Authors: Elena Dubrova

    Abstract: Binary machines are a generalization of Feedback Shift Registers (FSRs) in which both, feedback and feedforward, connections are allowed and no chain connection between the register stages is required. In this paper, we present an algorithm for synthesis of binary machines with the minimum number of stages for a given degree of parallelization. Our experimental results show that for sequences with… ▽ More

    Submitted 23 May, 2011; originally announced May 2011.

    Comments: 8 pages, 2 figures

  11. arXiv:1009.5802  [pdf, ps, other

    cs.CR

    Synthesis of Binary k-Stage Machines

    Authors: Elena Dubrova

    Abstract: An algorithm for constructing a shortest binary k-stage machine generating a given binary sequence is presented. This algorithm can be considered as an extension of Berlekamp-Massey algorithm to the non-linear case.

    Submitted 29 September, 2010; originally announced September 2010.

    Comments: 3 pages, 1 figure

  12. arXiv:0910.5595  [pdf, other

    cs.CR

    An Improved Implementation of Grain

    Authors: Shohreh Sharif Mansouri, Elena Dubrova

    Abstract: A common approach to protect confidential information is to use a stream cipher which combines plain text bits with a pseudo-random bit sequence. Among the existing stream ciphers, Non-Linear Feedback Shift Register (NLFSR)-based ones provide the best trade-off between cryptographic security and hardware efficiency. In this paper, we show how to further improve the hardware efficiency of Grain s… ▽ More

    Submitted 29 October, 2009; originally announced October 2009.

  13. arXiv:0903.3182  [pdf, ps, other

    cs.CR

    Finding matching initial states for equivalent NLFSRs in the fibonacci and the galois configurations

    Authors: Elena Dubrova

    Abstract: In this paper, a map** between initial states of the Fibonacci and the Galois configurations of NLFSRs is established. We show how to choose initial states for two configurations so that the resulting output sequences are equivalent.

    Submitted 18 March, 2009; originally announced March 2009.

    Comments: 4 pages

  14. arXiv:0801.4079  [pdf, ps, other

    cs.CR

    An equivalence preserving transformation from the Fibonacci to the Galois NLFSRs

    Authors: Elena Dubrova

    Abstract: Conventional Non-Linear Feedback Shift Registers (NLFSRs) use the Fibonacci configuration in which the value of the first bit is updated according to some non-linear feedback function of previous values of other bits, and each remaining bit repeats the value of its previous bit. We show how to transform the feedback function of a Fibonacci NLFSR into several smaller feedback functions of individ… ▽ More

    Submitted 30 January, 2008; v1 submitted 28 January, 2008; originally announced January 2008.

    Comments: 14 pages, 4 figures, one reference added, example 4 corrected