Single-Core CPU Cracks Post-Quantum Encryption Algorithm in One Hour

Researchers from KU Leuven have proposed an efficient key recovery attack method against the SIDH protocol, capable of breaking the SIKE post-quantum cryptographic algorithm using a standard single-core CPU in just one hour. The key encapsulation mechanism is a protocol that securely exchanges symmetric keys using asymmetric cryptographic techniques. SIKE (Supersingular Isogeny Key Encapsulation) is … Read more

Dynamic Intelligent Modeling Methods for Real-Time Flood Control Scheduling of Reservoir Groups

Li, J., Zhong, P., Yang, M., Zhu, F., Chen, J., Xu, B., Liu, W. (2019). Dynamic and Intelligent Modeling Methods for Joint Operation of a Flood Control System. Journal of Water Resources Planning and Management. 145, 0401904410. https://doi.org/10.1061/(ASCE)WR.1943-5452.0001110 Li, J., Zhong, P., Yang, M., Zhu, F., Chen, J., Liu, W., Xu, S. (2020). Intelligent identification … Read more

Chapter 6 Low Power Design Analysis (Part 1) – The Theory and Practice of IR Drop and EM

With the increase in device density and clock frequency of chips under advanced processes, power consumption has also significantly increased. At the same time, the supply voltage and transistor threshold voltage have been reduced, leading to significant leakage current. High power consumption can cause excessive temperature during device operation, reducing reliability due to electromigration and … Read more

Fundamentals of Low-Power Design: A Comprehensive Analysis of Multi-Bit Cells

This article was originally published in the Zhihu column [The Path of Digital IC Backend Engineers]. Multi-bit cells have been widely used in numerous chip designs as a means to control power consumption, and various EDA tools provide extensive and comprehensive support for them. Today, we will start with the basic structure and principles of … Read more

Low Power Design Methods – Overview of Power Gating (Part 1)

Leakage power consumption has increased with each generation of CMOS technology. This leakage power not only poses a serious challenge for battery-powered or portable products but is also becoming an issue that wired devices such as servers, routers, and set-top boxes must address. To reduce the total leakage power consumption of chips, it is best … Read more

Low Power Design Methods – Power Gating Design (Part 3)

State Retention and Restoration Methods Continuing from the previous text Low Power Design Methods – Power Gating Design (Part 1) Low Power Design Methods – Power Gating Design (Part 2) Given the power switch structure and isolation strategy, power gating can be applied to logic blocks. However, unless a retention strategy is employed, all state … Read more

Low Power Design Methods – Multi-Voltage Domain Design (Part 1)

The technologies discussed in the previous chapter are mature. Engineers have been using them for some time, and design tools have supported them for many years. In this chapter, we begin to discuss more recent and proactive methods to reduce power: power gating and adaptive voltage scaling, these two techniques. Both of these techniques differ … Read more

Low Power Design Methods – Frequency and Voltage Scaling

Low Power Design Methods – Frequency and Voltage Scaling The practical operational space of circuit design lies in the process, design goals, process libraries, and timing analysis methods. Under special processes, temperature inversion particularly limits the range of timing, voltage, and temperature to maintain their normal monotonic relationship. A detailed analysis of all these factors … Read more

Microchip Technology Launches MCP16701 PMIC to Meet Power Demands of AI Applications

As artificial intelligence rapidly integrates into industrial systems, computing platforms, and data center environments, the demand for advanced and efficient power management solutions is increasing. In response to this trend, Microchip Technology has launched the MCP16701, a highly integrated Power Management Integrated Circuit (PMIC) designed for engineers working with high-performance Microprocessors (MPUs) and Field Programmable … Read more

New National Standard for Vehicle Networking Security Officially Takes Effect! Is Your Smart Car Still Safe?

Abstract On April 1, 2025, the Chinese vehicle networking industry will witness a historic moment—the national standard “Detection Mechanism for Abnormal Behavior in Vehicle Networking Security” (GB/T 45181-2024) will officially be implemented!This standard, led by 360 Group and the China Academy of Information and Communications Technology, was jointly developed with industry giants such as China … Read more