Research lines

 

  • Design of Physical Unclonable FunctionsExploitation of physical unreliability effects in microelectronic devices in security applications.
  • Hardware realization of cryptographic algorithms:
    • Development of embedded systems for security following a hardware/software co-design methodology.
    • VLSI design for high-performance solutions in terms of speed, area, and power.
    • Applications of the above solutions to lightweight and post-quantum cryptograhy.
    • Developement of countermeasures to increase the security of cryptographic modules against hardware attacks.
  • Security evaluation and hardware attacks:
    • Developement of hardware fault-injection attacks and side-channel attacks.
    • Hardware security-level evaluation of cryptographic primitives.
  • Reliability: characterization and modeling of time-zero and time-dependent variability effects in micro/nano-electronic devices.
  • Modeling, simulation and synthesis techniques of analog, mixed-signal and RF circuits and systems:
    • Pareto-based behavioral modeling with support to multiple hierarchical design flows.
    • Layout-aware synthesis methodologies for analog/RF circuits.
    • Electromagnetic-simulation-based performance modeling of passive devices for RF circuit design.
    • Variability-aware design techniques.
    • Development and exploitation of emerging design methodologies: bottom-up techniques, hybrid techniques and competitive strategies.
    • Simulation techniques for time-zero and time-dependent variability.
  • Low-power circuit design in beyond-CMOS technologies.