Cédric Marchand

Cédric Marchand
École Centrale de Lyon | ECL · Département Electronique - Electrotechnique - Automatique - E.E.A.

Doctor of Philosophy

About

45
Publications
5,381
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
390
Citations
Introduction
As a member of the Heterogeneous System Design team on the Institute of Nanotechnology of Lyon, my research focuses on the design of novel energy-efficient computing architectures based on advanced, emerging and alternative devices and their impact on the Hardware Security of the system

Publications

Publications (45)
Chapter
Classical computing paradigms based on Von-Neumann and Harvard architectures are reaching their limits when facing data-intensive applications. The memory-centric paradigm appears to be a good candidate to break the memory and power walls by bringing computation closer to, or even completely inside, the memory. While current approaches are based on...
Article
Full-text available
This work presents new insights into 3D logic circuit design with vertical junctionless nanowire FETs (VNWFET) accounting for underlying electrothermal phenomena. Aided by the understanding of the nanoscale heat-transport in VNWFETs through multiphysics simulations, the SPICE-compatible compact model captures temperature and trapping effects princi...
Article
Full-text available
Emerging reconfigurable devices are fast gaining in popularity in the search for next-generation computing hardware, while ferroelectric engineering of the doping state in semiconductor materials has the potential to offer alternatives to the traditional von-Neumann architecture. In this work, we combine these concepts and demonstrate the suitabili...
Preprint
Full-text available
This special session paper introduces the Horizon Europe NEUROPULS project, which targets the development of secure and energy-efficient RISC-V interfaced neuromorphic accelerators using augmented silicon photonics technology. Our approach aims to develop an augmented silicon photonics platform, an FPGA-powered RISC-V-connected computing platform,...
Conference Paper
We propose a novel architecture for a photonic Physical Unclonable Function (PUF) based on microring arrays. We demonstrate its uniqueness, verify its random behavior on standard benchmarks, and investigate the impact of the digitization threshold.
Article
Full-text available
Emerging nonvolatile memory technologies are attracting interest from the system design level to implement alternatives to conventional von-Neumann computing architectures. In particular, the hafnium oxide-based ferroelectric (FE) memory technology is fully CMOS-compatible and has already been used for logic-in-memory architectures or compact terna...
Conference Paper
Emerging non-volatile memories are getting new interest in the system design community. They are used to design logic-in-memory circuits and propose alternatives to von-Neuman architectures. Hafnium oxide-based based ferroelectric memory technology, which is fully compatible with CMOS technologies is particularly interesting for logic-in-memory des...
Chapter
Gate-all-around Vertical Nanowire Field Effect Transistors (VNWFET) are emerging devices, which are well suited to pursue scaling beyond lateral scaling limitations around 7 nm. This work explores the relative merits and drawbacks of the technology in the context of logic cell design. We describe a junctionless nanowire technology and associated co...
Presentation
Full-text available
Invited talk during an In-Memory-Computing workshop organized by the French GDR SOC2
Presentation
Full-text available
Edge computing requires highly energy efficient microprocessor units with embedded non-volatile memories to process data at IoT sensor nodes. Ferroelectric non-volatile memory devices are fast, low power and high endurance, and could greatly enhance energy-efficiency and allow flexibility for finer grain logic and memory. This presentation projects...
Article
Full-text available
Active tags and sensor nodes are an important part of the devices involved in the Internet of Things and in some cases it is impossible to power them using standard power supply or even battery. In such a case, battery-less smart sensors are needed. Design this kind of smart system is not an easy task and many different considerations must be taken...
Article
Today, life is becoming increasingly connected. From TVs to smartphones, including vehicles, buildings, and household appliances, everything is interconnected in what we call the "Internet of Things" (IoT). IoT is now part of our life and we have to deal with it. More than 10 billion devices are already connected and five times more are expected to...
Chapter
Over the past 10 years, the multiplication of highly constrained applications such as radio-frequency identification and sensor networks has lead to a new trend in cryptographic primitive development. Many algorithms have been developed specifically for these new applications and they are commonly categorized as lightweight cryptographic algorithms...
Chapter
One of the solutions for the IP designers to protect their intellectual property is to be able to detect the presence of a copy of an IP embedded in a digital device by using IP identification.
Thesis
Le vol et la contrefaçon touchent toutes les sphères industrielles de nos sociétés. En particulier, les produits électroniques représentent la deuxième catégorie de produits la plus concernée par ces problèmes. Parmi les produits électroniques les plus touchés, on retrouve les téléphones mobiles, les tablettes, les ordinateurs mais aussi des élémen...
Article
Over the past 10 years, the multitude of highly constrained applications such as radio-frequency identification and sensor networks has led to a new trend in the development of cryptographic primitives. Many algorithms categorized as lightweight cryptographic algorithms have been developed specifically for these new applications. Comparing them is...
Article
Synchronous finite state machines (FSMs) are the backbone of an embedded controller design. We propose a non-destructive watermark embedding algorithm and a contactless verification method for protecting the design intellectual property (IP) of an embedded controller modeled as a synchronous FSM. The proposed embedding algorithm does not require ad...
Poster
Full-text available
Physical unclonable functions (PUF) are a promising approach in design for trust and security. A PUF derives a unique identifier using physical characteristics of different dies containing an identical circuit, so it can be used to authenticate chips and for identification. The transient effect ring oscillator (TERO) PUF is based on the extraction...
Article
This paper proposes a theoretical study and a full overview of the design, evaluation and optimization of a PUF based on transient element ring oscillators (TERO-PUF). We show how, by following some simple design rules and strategies, designers can build and optimize a TERO-PUF with state of the art PUF characteristics in a standard CMOS technology...
Article
Full-text available
Cryptographic primitives such as True Random Number Generator (TRNG), Physical Unclonable Function (PUF) but also cryptographic algorithms need to be tested and evaluated in different technologies, but with identical system architecture and operating conditions in order to be fairly compared. The random data generated by a TRNG or responses of a PU...
Conference Paper
We propose non-destructive embedding and verification methods for protecting the intellectual properties of an embedded control unit. The proposed methods do not require augmenting the original finite state machine which specifies the control unit. Experimental results show the feasibility of the methods.
Article
Hardware Trojans (HTs) are an emerging threat for integrated circuits integrity and their applications. Trying to find efficient HT detection methods is necessary. However, before detecting them, HTs need to be created with an efficient method and their effects need to be understood. There are very few studies which describe HTs implementation meth...
Article
Full-text available
The increasing production costs of electronic devices and changes in the design methods of integrated circuits (ICs) has led to emerging threats in the microelectronics industry. Today, high value chips are the target of counterfeiting, theft and malicious hardware insertion (such as hardware trojans). Intellectual property (IP) protection has beco...
Article
The increasing production costs of electronic devices and changes in the design methods of integrated circuits (ICs) has led to emerging threats in the microelectronics industry. Intellectual property (IP) protection has become a major concern and we propose to fight counterfeiting and theft by designing salutary hardware (salware). A salware add p...

Network

Cited By