Research lines
- Design of Physical Unclonable Functions: Exploitation of physical unreliability effects in microelectronic devices in security applications.
- Hardware realization of cryptographic algorithms:
- Development of embedded systems for security following a hardware/software co-design methodology.
- VLSI design for high-performance solutions in terms of speed, area, and power.
- Applications of the above solutions to lightweight and post-quantum cryptograhy.
- Developement of countermeasures to increase the security of cryptographic modules against hardware attacks.
- Security evaluation and hardware attacks:
- Developement of hardware fault-injection attacks and side-channel attacks.
- Hardware security-level evaluation of cryptographic primitives.
- Reliability: characterization and modeling of time-zero and time-dependent variability effects in micro/nano-electronic devices.
- Modeling, simulation and synthesis techniques of analog, mixed-signal and RF circuits and systems:
- Pareto-based behavioral modeling with support to multiple hierarchical design flows.
- Layout-aware synthesis methodologies for analog/RF circuits.
- Electromagnetic-simulation-based performance modeling of passive devices for RF circuit design.
- Variability-aware design techniques.
- Development and exploitation of emerging design methodologies: bottom-up techniques, hybrid techniques and competitive strategies.
- Simulation techniques for time-zero and time-dependent variability.
- Low-power circuit design in beyond-CMOS technologies.