Author Archives: Caroline

    Cryptographic Engineering

    June 24-28, 2024

    Registration deadline: May 24, 2024
    Payment deadline: June 14, 2024

    Download One-Page Schedule Here

    registration
    Course material will be distributed only if fees have been paid by the deadline for payment.

    MONDAY, June 24

    8:30-10:00 am Introduction to Block Ciphers; DES and AES Christof Paar
    10:30-12:00 am Lightweight Block Ciphers for RFIDs Christof Paar
    1:30-3:00 pm Public-Key Cryptography Algorithms and Protocols Çetin K. Koç
    3:30-5:00 pm Integer Arithmetic Algorithms and Architectures Çetin K. Koç

    TUESDAY, June 25

    8:30-10:00 am Specialized Hardware for Secret-Key Algorithms Ingrid Verbauwhede
    10:30-12:00 am Introduction to PUFs (Physically Uncloneable Functions) Ingrid Verbauwhede
    1:30-3:00 pm Finite Field Arithmetic Algorithms and Architectures Çetin K. Koç
    3:30-5:00 pm Public-Key Cryptographic Hardware and Embedded Systems Çetin K. Koç

    WEDNESDAY, June 26

    8:30-10:00 am Introduction to Side-Channel Analysis Marc Joye
    10:30-12:00 am Block Ciphers: Attacks and Countermeasures Marc Joye
    1:30-3:00 pm Trusted Computing Architectures, SSL and IPSec Pankaj Rohatgi
    3:30-5:00 pm Electromagnetic Attacks, Countermeasures and Advanced Analysis Techniques Pankaj Rohatgi

    THURSDAY, June 27

    8:30-10:00 am RSA/ECC: Attacks and Countermeasures Marc Joye
    10:30-12:00 am Fully Homomorphic Encryption Marc Joye
    1:30-3:00 pm Post-Quantum Cryptography Algorithms Francisco Rodrìguez-Henrìquez
    3:30-5:00 pm Post-Quantum Cryptography Implementations Francisco Rodrìguez-Henrìquez

    FRIDAY, June 28

    8:30-10:00 am Random Number Generators for Cryptographic Applications Werner Schindler
    10:30-12:00 am Evaluation Criteria for Non-Deterministic Random Number Generators Werner Schindler
    1:30-3:00 pm Random Number Generator Design Constraints and Challenges Viktor Fischer
    registration

    Scroll to Top


    Abstracts

    Cryptographic Engineering
    January 24-28, 2024
    EPFL Premises, Lausanne, Switzerland

    Introduction to Block Ciphers: DES and AES
    Christof Paar, Ruhr-University Bochum, Germany

    We will first give a brief introduction to AES, DES and 3DES, which are the most widely used symmetric ciphers. We will then develop method for efficiently implementing both AES and 3DES in software. For AES, algorithms for both 32 bit CPUs and 8 bit smart card CPUs, will be treated. We will then introduce the bit-slicing method, an advanced and very efficient approach for fast software implementation of block ciphers. We will use DES as an example for illustrating bit-slicing.

    Lightweight Block Ciphers for RFIDs
    Christof Paar, Ruhr-University Bochum, Germany

    For extremely resources constrained environments such as RFIDs, sensor notes or other mobile applications, it is highly desirable to have ciphers which are extremely lightweight. We will introduce optimization techniques for low-area and low-power ciphers. PRESENT, which is an extremely compact block cipher, will be discussed as a case study.

    Public-Key Cryptography Algorithms and Protocols
    Çetin K. Koç, UC Santa Barbara, USA

    Computational requirements of RSA, Elliptic Curve Cryptography, Diffie-Hellman, ElGamal, and DSA and their ECC variants. PKC computational pyramid. PKC ALU Design. Lessons of the first RSA chip. Exponentiation and point multiplication. Addition chains. Power tree and factor method. Binary and m-ary methods. Sliding window methods. Addition-subtraction chains. Canonical encoding algorithm. The NAF algorithm and its variants. Optional: Koblitz curves and tau-adic expansions.

    Integer Arithmetic Algorithms and Architectures
    Çetin K. Koç, UC Santa Barbara, USA

    Integer rings. Addition and multiplication. Modular addition and multiplication. Montgomery multiplication and exponentiation. Multiplicative inversion. The CIOS algorithm. Arithmetic with special primes. Solinas algorithms.

    Specialized Hardware for Secret-Key Algorithms
    Ingrid Verbauwhede, KU Leuven, Belgium

    This lecture will introduce hardware implementation aspects of block ciphers and stream ciphers. The DES and AES algorithm will be discussed in detail. These ciphers are never used standalone but combined with modes of operation and integrated as IP blocks in larger systems. Very compact realizations and very high throughput realizations will also be discussed.

    Introduction to PUFs (Physically Uncloneable Functions)
    Ingrid Verbauwhede, KU Leuven, Belgium

    CMOS process variations are considered a burden to IC developers since they introduce undesirable random variability between equally designed ICs. Measuring this variability can also be profitable as a physically unclonable method of silicon device identification. This can be applied to generate strong cryptographic keys which are intrinsically bound to the embedding IC instance. In this lecture, we study and compare different proposed constructions.

    Finite Field Arithmetic Algorithms and Architectures
    Çetin K. Koç, UC Santa Barbara, USA

    Representing field elements. Polynomial and normal basis. Addition in GF(2^k). Multiplication in polynomial basis. Irreducible polynomials. Normal basis squaring. Optimal normal basis multiplication. Quadratic and sub-quadratic multiplication algorithms. Karatsuba multiplication. Recursive Karatsuba algorithm. 2-Term and 3-Term Karatsuba algorithm and generalization. Montgomery-Karatsuba formulas.

    Public-Key Cryptographic Hardware and Embedded Systems
    Çetin K. Koç, UC Santa Barbara, USA

    Scalable dual-field arithmetic. Putting together GF(p) and GF(2^k) arithmetic. Montgomery multiplication in GF(2^k). Unified or dual-field full adder. Scalable and dual-field Montgomery multiplication. PKC on embedded software. Functional characteristics of embedded platforms. Incomplete addition. Compilers and assembler optimizations. Special curve solutions.

    Introduction to Side-Channel Analysis
    Marc Joye, Zama, France

    Side-channel analysis is a powerful technique re-discovered by Kocher in 1996. The principle consists in monitoring some side-channel information like the running time, the power consumption or the electromagnetic radiation. Next, from the monitored data, the adversary tries to deduce the inner-workings of the algorithm and thereby to retrieve some secret information. This talk reviews the basics of side-channel analysis on various cryptographic algorithms. It is illustrated with practical examples and several side-channel attacks are mounted against several naive, unprotected implementations of cryptosystems.

    Block Ciphers: Attacks & Countermeasures
    Marc Joye, Zama, France

    In this lecture, we will review some attacks against implementations of block ciphers. We will also present countermeasures to prevent these attacks. Focus will be on the AES block cipher.

    Trusted Computing Architectures, SSL and IPSec
    Pankaj Rohatgi, Cryptograpy Research, USA

    Businesses, governments and individuals are increasingly reliant on complex, highly-interconnected computing platforms, mobile end-points and network centric applications to conduct much of their business. Maintaining and validating the trustworthiness of this infrastructure has therefore become critical. However, as the complexity and value of the infrastructure has increased, the number of software vulnerabilities discovered and attacks mounted against applications, platforms, end-points, identities and sensitive data within this infrastructure have grown at an even faster pace. There is a realization that given this complexity, software-only security mechanisms may not be sufficient to defend against these attacks or to evaluate the trustworthiness of a system.
    Trusted computing is an effort to use trusted hardware to assist software in improving and evaluating the security for platforms, end-points, applications, identities and data. In this lecture, I will describe the Trusted Platform Module (TPM), which provides the hardware foundations for Trusted Computing and describe several ways in which the TPM could be used as a building block to improve or validate the security of platforms, end-points, applications, data and identities.

    Electromagnetic Attacks, Countermeasures and Advanced Analysis Techniques
    Pankaj Rohatgi, Cryptograpy Research, USA

    This lecture will provide an introduction to the electromagnetic emanation (EM) side-channel. We will describe the various types of compromising EM emanations and the equipment needed to capture them. We will illustrate how compromising EM emanations can be captured from a variety of cryptographic devices and how multiple signals can be captured from each device. Next we will illustrate a variety of EM attacks on cryptographic implementations. Although the attack techniques are similar to power analysis, many EM attacks are not feasible using the power side channel, either because they exploit additional leakages present in EM channels or the power side-channel is inaccessible. Finally we will describe how one can design countermeasures against EM attacks.

    RSA/ECC:  Attacks & Countermeasures
    Marc Joye, Zama, France

    Abstract to come

    Fully Homomorphic Encryption
    Marc Joye, Zama, France

    Fully homomorphic encryption (FHE) allows computing over encrypted data. In this lecture, we will cover some advanced topics in FHE. In particular, we will cover bootstrapping of ciphertexts and its extension to programmable bootstrapping. The general case of multivariate functions over encrypted data will also be dealt with. Applications to the private evaluation of neural networks will be discussed.

    Post-Quantum Cryptography Algorithms
    Francisco Rodrìguez-Henrìquez, Cryptography Research Centre of the Technology Innovation Institute at Abu Dhabi, UAE

    As of today, most cryptographic systems deployed in the real world use asymmetric primitives that rely on the hardness of integer factorization (most notably RSA public-key encryption and signatures), or the (elliptic-curve) discrete-logarithm problem. While a sensible choice of parameters for these schemes are believed to resist attacks launched from classical computers, it is known since Shor’s seminal 1994 paper, that a large universal quantum computer will be able to solve both factoring and discrete logarithms in polynomial time. Fortunately, when sufficiently large quantum computer become a reality, this will not imply the end of efficient public-key cryptography. There exist various approaches for constructing public-key encryption or key-encapsulation mechanisms (KEMs) and signatures that — as far as we know — can resist attacks coming from large universal quantum computers.
    In this lecture we present an introduction to the most important techniques for achieving a secure and efficient implementation of so-called post-quantum cryptography, the anticipated next generation of asymmetric cryptography. Concretely, we will study five main approaches to construct such post-quantum cryptography, namely, Lattice-based Cryptography, Code-based Cryptography, Multivariate Cryptography, Hash-based Cryptography, Isogeny-based Cryptography.

    Post-Quantum Cryptography Implementation
    Francisco Rodrìguez-Henrìquez, Cryptography Research Centre of the Technology Innovation Institute at Abu Dhabi, UAE

    In this class we present an introduction to the most important techniques for achieving a secure and efficient implementation of so-called post-quantum cryptography, the anticipated next generation of asymmetric cryptography. Concretely, we will revise the algorithms and their best software implementation practices.

    Random Number Generators for Cryptographic Applications
    Werner Schindler, BSI Bund, Germany

    Many cryptographic mechanisms require random numbers, e.g. as challenges, session keys or signature parameters. Inappropriate random number generators may weaken principally strong cryptographic mechanisms considerably. Requirements are formulated that appropriate random number generators should fulfill and concrete examples are discussed. Relevant differences between deterministic and the non-deterministic random number generators are worked out.

    Evaluation Criteria for Non-Deterministic Random Number Generator
    Werner Schindler, BSI Bund, Germany

    In this lecture, I will investigate in more details the problem of physical security evaluations against side-channel attacks, with applications to implortant classes of countermeasures such as masking. In a first step, I will descibe formal approaches to quantify the information leakages and put forward their potential shortcomings. Next, I will use case studies to illustrate that one can gain good intuition about the security of certain implementation based on simple heuristic formulas.

    Random Number Generator Design Constraints and Challenges
    Viktor Fischer, Université de Saint Etienne, France

    In this lecture, we will first analyze the main characteristics of random number generators (RNGs): quality related issues such as sources of randomness, entropy extraction principles, post-processing, output bit-rate and its stability; security related issues such as existence of a mathematical model, inner testability and robustness against attacks; design related issues such as resource usage, power consumption, feasibility in logic devices and design automation. Next, we will critically analyze and compare the main existing RNG principles. Based on this analysis, we will point out pitfalls that can exist in a practical RNG design and challenges that are usually faced when designing secure RNGs according to recommendations AIS 20/AIS 31.

    registration

    Scroll to Top


    Low-Power Analog IC Design

    August 29 – September 2, 2022

    Registration deadline: July 15, 2022
    Payment deadline: August 19, 2022

    Download One-Page Schedule Here

    registration
    Course material will be distributed only if fees have been paid by the deadline for payment.

    MONDAY, August 29

    8:30-12:00 am MOS Transistor Modeling for Low-Voltage and Low-Power Circuit Design Christian Enz
    1:30-3:00 pm Basic Low-Power Low-Voltage Circuit Techniques Willy Sansen
    3:30-5:00 pm Differential Amplifying Blocks with Positive Feedback Willy Sansen

    TUESDAY, August 30

    8:30-10:00 am Noise Performance of Elementary Transistor Stages Willy Sansen
    10:30-12:00 am Stability of Operational Amplifiers Willy Sansen
    1:30-3:00 pm Systematic Design of Low-Power Operational Amplifiers Willy Sansen
    3:30-5:00 pm Important Opamp Configurations Willy Sansen

    WEDNESDAY, August 31

    8:30-10:00 am Fully Differential Opamps Willy Sansen
    10:30-12:00 am Bandgap and Current Reference Circuits Willy Sansen
    1:30-5:00 pm Design of Low-Power Analog Circuits using the Inversion Coefficient Christian Enz

    THURSDAY, September 1

    8:30-10:00 am Distortion in Elementary Transistor Circuits Willy Sansen
    10:30-12:00 am Low-Power Continuous-Time Filters Willy Sansen
    1:30-3:00 pm Practical Techniques of Frequency Compensation Vadim Ivanov
    3:30-5:00 pm Nanopower Design Techniques & Efficient Energy Harvesting Vadim Ivanov

    FRIDAY, September 2

    8:30-12:00 am Micropower ADCs Kofi Makinwa
    1:30-5:00 pm Matching of MOS Transistors in Deep-Submicron Marcel Pelgrom
    registration

    Scroll to Top


    Abstracts

    Low-Power Analog IC Design
    August 29 – September 2, 2022
    EPFL Premises, Lausanne, Switzerland

    MOS Transistor Modeling for Low-Voltage and Low-Power Circuit Design
    Christian Enz, EPFL

    Evolution of CMOS technologies: process scaling, low-voltage constraint. Basic long-channel static theory. Short- and narrow-channel effects. Quasi-static dynamic model. Thermal and flicker noise model. Parameter extraction. The EKV model and its use for LV and LP analog circuit design.

    Basic low-Power low-Voltage Circuit Techniques
    Willy Sansen, KU Leuven

    Weak inversion and bipolar operation of MOS transistors. BiCMOS versus CMOS. Passive components and pseudo-resistive networks. Elementary building blocks operated at low supply voltage and/or low current: current mirrors, standard and special structures; differential pairs and linearization techniques; elementary voltage-gain cells, MOS- inverter amplifier. Low-voltage cascode and pseudo-cascode configurations. LP/LV current and voltage references. Translinear circuits and principle of log-domain filters.

    Differential Amplifying Blocks with Positive Feedback
    Willy Sansen, KU Leuven

    Practical designs are built up by means of differential pairs, current sources and two-transistor cascodes. They are analyzed in detailed followed by fully-differential voltage and current amplifiers. Positive feedback is added as well to enhance both the Gain and the Gain-Bandwidth. Design procedures are discussed in all regions of operations (from weak to strong inversion and velocity saturation).

    Noise Performance of Elementary Transistor Stages
    Willy Sansen, KU Leuven

    Long list of opamp configurations is discussed to show which alternative circuit tricks have been used to comply with certain specifications. Considerable design detail is presented on the symmetrical opamp and on the folded cascode. This lecture includes mainly circuit realizations in CMOS but also some in BICMOS technology.

    Stability of Operational Amplifiers
    Willy Sansen, KU Leuven

    Multistage operational amplifiers require compensation capacitances for stability. The conditions for stability are discussed for both two-stage and three-stage operational amplifiers. Techniques are given to avoid the positive zero and to realize minimum power consumption at the same time. Several design examples are worked out.

    Systematic Design of Low-Power Operational Amplifiers
    Willy Sansen, KU Leuven

    For low-power optimization, an operational amplifier can be designed for high speed and stability according to three different design procedures, all leading to the same final result. They will be discussed for a two- and three stage amplifier. The compromises with other specifications such as noise, input and output range will be discussed as well and illustrated for a number of often used configurations.

    Important Opamp Configurations
    Willy Sansen, KU Leuven

    Long list of opamp configurations is discussed to show which alternative circuit tricks have been used to comply with certain specifications. Considerable design detail is presented on the symmetrical opamp and on the folded cascode. This lecture includes mainly circuit realizations in CMOS but also some in BICMOS technology.

    Fully-Differential Operational Amplifiers
    Willy Sansen, KU Leuven

    Together with distortion, noise is the main limitation of the performance of analog circuits. It is introduced with simplified expressions for both the MOST and bipolar transistor and applied to the elementary stages with one and two transistors. Also the noise due to parasitic resistances is identified and described. Considerable attention goes to resistive and capacitive noise matching in ultra-low-noise amplifiers.

    Bandgap and Current Reference Circuits
    Willy Sansen, KU Leuven

    Voltage references are required in all ADC’s. Current references are required for all biasing. Bandgap references in CMOS technologies are discussed. The compromises at low power consumption are highlighted. Realizations are presented of bandgap references down to 0.8 V supply voltage.

    Design of Low-power Analog Circuits using the Inversion Coefficient
    Christian Enz, EPFL

    The supply voltage of CMOS chips has constantly been scaled down in the last years to reach now the sub-1V region. This supply voltage reduction is mainly driven on one hand by the technology constraints to maintain a reasonable electric field within the MOS device to avoid high-field effects and on the other hand by the needs of digital circuits to reduce the dynamic power consumption. Analog circuits unfortunately don’t take any advantage of this voltage down-scaling since almost all their performances are degraded and some basic circuits would even stop operating correctly. We will discuss the main challenges faced when designing analog circuits for ultra-low voltage (ULV) operation. We will first present the fundamental limits set by ULV, together with the technology limitations (such as matching) for analog circuits. We will then have a closer look at the MOS transistor operation with a particular focus on weak inversion, the Gm/ID characteristic and the inversion coefficient design approach. We then will review several basic building blocks capable of operating at ULV, including both continuous-time and sampled-data circuits. Finally we will investigate the potential of designing RF circuits in ULV taking advantage of ultra-deep submicron processes and give some design examples.

    Distortion in Elementary Transistor Circuits
    Willy Sansen, KU Leuven

    For low supply voltage, a larger fraction of the total supply voltage has to be used, leading to more distortion. The several sources of nonlinear distortion are discussed for MOSTs and bipolar transistor, single-ended and differential. Also the role of feedback is examined in detail. All distortion mechanisms are analyzed in full operational amplifier configurations.

    Low-Power Continuous-Time Filters
    Willy Sansen, KU Leuven

    High-frequency filters are usually continuous-time type filters. They are simple in schematic and are able to handle large signals with low distortion. Moreover they need tuning circuits to be able to set the frequency and the quality factor. Most important filter schematics are reviewed and compared for high-frequency capability and power consumption.

    Practical Techniques of Frequency Compensation
    Vadim Ivanov, Texas Instruments

    Every analog IC comprises multiple feedback loops. Interaction between these loops makes frequency compensation of such system non-trivial task, unsupported by the general control theory. Every MOS or bipolar transistor is nonlinear, which may cause conditional stability and complicate compensation.
    We will consider system structure design for stability, needed for it elementary circuit cells additional to the textbook techniques, as well as ways to achieve unconditional system stability when component parameters vary, and when load and signal source impedance is not well defined. Examples include LDOs stable with any load capacitance, transconductors with wide (few volts) input voltage range, and multistage operational amplifiers.

    Nanopower Design Techniques & Efficient Energy Harvesting
    Vadim Ivanov, Texas Instruments

    This lecture covers power management of systems having long periods of idle time with very low power consumption alternated by active high power states, like systems with power harvesting. Circuit techniques used in ultra low power analog circuits applicable in power harvesting systems will be presented, including nanoampere biasing, voltage references with sub-volt supply, active rectifiers, comparators, oscillators and error amplifiers. Also covered design techniques and circuits of DC/DC converters, providing high efficiency at a wide range of loads down to the microampere range and battery chargers with maximum power point tracking and battery protection.

    Micropower ADCs
    Kofi Makinwa, TU Delft

    With the current trend towards increasingly autonomous systems, micropower ADCs have become critical components. In this presentation, the basic principles of micropower SAR and sigma-delta ADCs will be discussed. It will also be shown how these two proven techniques can be combined to realize high resolution micropower ADCs.

    Matching of MOS Transistors in Deep-Submicron
    Marcel Pelgrom, NXP Semiconductors

    Orders of magnitude. Offset: electrical, technological and timing aspects. Random matching: general description, application to MOS. Deep submicron CMOS matching considerations. Modeling and simulation of MOS transistor mismatch. Design examples. Packaging effects.

    registration

    Scroll to Top


    Delta-Sigma Data Converters

    June 29 – July 3, 2020

    Registration deadline: May 22, 2020
    Payment deadline: June 15, 2020

    registration
    Course material will be distributed only if fees have been paid by the deadline for payment.

    MONDAY, June 29

    8:30-12:00 pm Delta Sigma Converter Basics, Parts A & B Shanthi Pavan
    1:30-5:00 pm Delta Sigma Converter Basics, Parts C & D Shanthi Pavan

    TUESDAY, June 30

    8:30-10:00 am Delta Sigma Converter Basics, Part E Shanthi Pavan
    10:30-12:00 pm High-Level Design of CTDS Modulators Shanthi Pavan
    1:30-5:00 pm Non-Idealities in CTDS Modulators Shanthi Pavan

    WEDNESDAY, July 1

    8:30-10:00 am Design of Building Blocks for CTDS Modulators Shanthi Pavan
    10:30-12:00 pm Systematic Design Centerning of a Practical
    CTDS Modulators
    Shanthi Pavan
    1:30-3:00 pm Circuit Techniques to Mitigate Flicker Noise in
    CTDS Modulators
    Shanthi Pavan
    3:30-5:00 pm Dynamic Element Matching (Part 1) Ian Galton

    THURSDAY, July 2

    8:30-10:00 am Dynamic Element Matching (Part 2) Ian Galton
    10:30-12:00 pm VCO-Based Delta Sigma ADCs Ian Galton
    1:30-3:00 pm Discrete-Time Delta-Sigma Design David Johns
    3:30-5:00 pm Introduction to the Delta-Sigma Toolbox David Johns

    FRIDAY, July 3

    8:30-10:00 am Bandpass Delta-Sigma ADCs David Johns
    10:30-12:00 pm Incremental and Sensor ADCs David Johns
    1:30-3:00 pm Circuit Noise Issues with ADCs David Johns
    registration

    Scroll to Top


    Abstracts

    Delta-Sigma Data Converters
    June 29 – July 3, 2020
    EPFL Premises, Lausanne, Switzerland

    Delta Sigma Converter Basics, Parts A & B
    Shanthi Pavan, Indian Institute of Technology

    Review of quantization noise, oversampling and noise shaping. Signal dependent stability, fundamental tradeoffs in DS modulators – maximum stable amplitude and noise shaping.  Simulation techniques for Delta-Sigma Modulators.

    Delta Sigma Converter Basics, Parts C, D & E
    Shanthi Pavan, Indian Institute of Technology

    Abstract to come.

    High-Level Design of Continuous-Time Delta-Sigma Modulators
    Shanthi Pavan, Indian Institute of Technology

    Systematic design of Continuous-Time Delta-Sigma Modulators from the DT prototype using z-transform and state space methods. The “method of moments” approach to design and intuitive understanding of Continuous-Time Delta-Sigma Modulators.

    Non-idealities in Continuous-Time Delta-Sigma Modulators
    Shanthi Pavan, Indian Institute of Technology

    Excess loop delay, and compensation techniques. Clock jitter and metastability. Clock jitter and metastability (contd). Mitigating effects of jitter in CTDSMs. Time constant variations. Loop filter nonlinearity.

    Design of Building Blocks for Continuous-Time Delta-Sigma Modulators
    Shanthi Pavan, Indian Institute of Technology

    Abstract to come.

    Systematic Design Centering a Practical Continuous-Time Delta-Sigma Modulator
    Shanthi Pavan, Indian Institute of Technology

    Abstract to come.

    Circuit Techniques to Mitigate Flicker Noise in Continuous-Time Delta-Sigma Modulators
    Shanthi Pavan, Indian Institute of Technology

    Abstract to come.

    Dynamic Element Matching (Part 1)
    Ian Galton, UC San Diego

    Randomization and element rotation techniques. Tree structured mismatch shaping.

    Dynamic Element Matching (Part 2)
    Ian Galton, UC San Diego

    This lecture will explain dynamic element matching (DEM) techniques in general and mismatch-noise shaping DEM in particular. Topics include qualitative and quantitative explanations of how error from component mismatches is spectrally shaped without knowledge of the mismatches, DEM DAC topologies and their limitations, DEM encoder algorithms and implementations, and the fundamental performance tradeoffs that govern all types of DEM.

    VCO-Based Delta-Sigma ADCs
    Ian Galton, UC San Diego

    ADCs based on ring oscillator voltage controlled oscillators (VCOs) enabled by digital calibration have the functionality of conventional continuous-time delta-sigma ADCs, but without the need for analog integrators, feedback DACs, comparators, reference voltages, or low-jitter clocks. Therefore, they use much less area than comparable conventional delta-sigma ADCs, are well-suited to advanced CMOS technology, and can easily support reconfigurability. This lecture will describe the principles of VCO-based ADCs, their limitations, techniques such as digital calibration for addressing their limitations, and will present case studies of example IC implementations.

    Discrete-Time Delta-Sigma Design
    David Johns, University of Toronto

    This talk will discuss the design of switched-capacitor delta sigma design. The basics of switched-capacitor circuits will be presented as well as circuit approaches to overcome limitations. In addition, the design of delta sigma converters using switched capacitor circuits will be discussed with the use of an example design.

    Introduction to the Delta-Sigma Toolbox
    David Johns, University of Toronto

    This talk will give an introduction to the use of a Matlab toolbox called the ³Delta Sigma Toolbox². Extensive examples will be given as well as how to make use of state-space to use different filter topologies as well as dynamic range scaling.

    Bandpass Delta-Sigma ADCs
    David Johns, University of Toronto

    This talk will discuss the design of Bandpass Delta Sigma ADCs which are useful in RF systems. Topics covered include resonator structures, architecture choices and example systems.

    Incremental and Sensor ADCs
    David Johns, University of Toronto

    This talk will discuss the design of incremental ADCs as well as low-frequency sensor data converters. These goal of these converters are to not only have high linearity and SNR but also to have low offset and high accuracy.

    Circuit Noise Issues with ADCs
    David Johns, University of Toronto

    This talk will discuss noise in basic circuits and opamps as well as a simple switched-C integrator as they apply to data converters. Topics covered include device noise basics, amplifier/cascode/mirror/diff-pair noise, switched-C noise, and oversampling.

    registration

    Scroll to Top


    PLL Design

    June 23-27, 2025

    Registration deadline: May 23, 2025
    Payment deadline: June 17, 2025

    Dowload one-page schedule here

    registration
    Course material will be distributed only if fees have been paid by the deadline for payment.

    MONDAY, June 23

    8:30-10:00 am Fundamentals of Analog PLLs Michiel Steyaert
    10:30 am-12:00 pm Interference Effects in PLLs Michiel Steyaert
    1:30-5:00 pm Spiral Inductor Interference, Deadzone and Phase Noise Michiel Steyaert

    TUESDAY, June 24

    8:30 am-12:00 pm VCO Design Ali Hajimiri
    1:30-5:00 pm Jitter and Phase Noise in PLLs Ali Hajimiri

    WEDNESDAY, June 25

    8:30-10:00 am PLL Analysis and Modeling Sam Palermo
    10:30 am-12:00 pm PLL Building Blocks Sam Palermo
    1:30-5:00 pm Analog Fractional-N PLLs for Frequency Synthesis Ian Galton

    THURSDAY, June 26

    8:30 am-12:00 pm All-Digital PLL Architecture and Implementation Bogdan Staszewski
    1:30-3:00 pm Time-to-Digital Converter (TDC) Bogdan Staszewski
    3:30-5:00 pm FDC-Based Digital PLLs Ian Galton

    FRIDAY, June 27

    8:30-10:00 am Digitally-Controlled Oscillator (DCO) Bogdan Staszewski
    10:30 am-12:00 pm Clock Generation and Distribution in Wireline Systems Sam Palermo
    1:30-3:00 pm PLL-Based Clock and Data Recovery Systems Sam Palermo
    registration

    Scroll to Top


    Abstracts

    Analog Fractional-N PLLs for Frequency Synthesis
    Ian Galton, UC San Diego, USA

    This lecture explains the extension of integer-N PLLs to fractional-N PLLs for both fine tuning resolution and in-loop VCO modulation. It presents an overview of modulus quantization noise shaping techniques, tradeoffs associated with quantization noise shaping order and PLL loop bandwidth, non-ideal effects of particular concern in fractional-N PLLs such as charge pump nonlinearities and data-dependent multi-modulus divider delays, techniques for increasing loop bandwidth, simulation techniques, and case studies of example circuits and applications.

    PLL Design
    June 23-27, 2025

    EPFL Premises, Lausanne, Switzerland

    Fundamentals of Analog PLLs
    Michiel Steyaert, KU Leuven, Belgium

    Basic definitions and concepts of phase locked loop topologies. Frequency behaviour, stability and settling of PLL topologies. Introduction of analog, digital and fractional N synthesizers. Introduction to Phase noise and jitter.

    Interference Effects in PLLs
    Michiel Steyaert, KU Leuven, Belgium

    Different interference effects in PLLs are discussed. First de Dead-zone in phase detectors. Secondly, the design of prescalers and the effect of mismatch in noise performance in fractional-N. Finally the RF and Power supply coupling effects.

    Spiral Inductor Interference, Deadzone and Phase Noise
    Michiel Steyaert, KU Leuven, Belgium

    Different interference effects in PLLs are discussed. First de Dead-zone in phase detectors. Secondly, the design of prescalers and the effect of mismatch in noise performance in fractional-N. Finally the RF and Power supply coupling effects.

    VCO Design – Jitter and Phase Noise in PLLs
    Ali Hajimiri, Caltech, USA

    We start this lecture with an overview of the VCO noise concepts and some of the classical work in this area. We elucidate some of the basic properties of oscillator phase noise through several thought experiments. Then we go through a step-by-step development of a time-varying noise model for oscillators and discuss the evolution of noise in an oscillator from its physical sources to frequency and amplitude fluctuations. In this process, we see how low frequency noise sources affect the oscillator behavior and discuss the impact of time-varying and correlated noise source. In the second part of the lecture, we discuss how the new design insights obtained from our model leads to novel VCO topologies that overcome some of their basic challenges and limitations. We discuss additional trade-offs in VCOs and apply them in the context of several practical design examples for a broad range of frequencies and applications. Finally, we focus our attention to the noise process in phase-locked loops and analyze it using a parallel time- and frequency-domain analysis of noise in PLLs.

    PLL Analysis and Modeling
    Sam Palermo, Texas A&M University, USA

    This talk covers modeling techniques for analog and digital PLLs. This includes linear continuous-time (s-domain) and discrete-time (z-domain) models and non-linear time-domain models that allow for optimization of system bandwidth, stability, and noise performance.

    PLL Building Blocks
    Sam Palermo, Texas A&M University, USA

    This talk covers circuit design techniques for the main building blocks, excluding the VCO, used in analog and digital PLLs. This includes phase detectors, time-to-digital converters, analog and digital loop filters, and high-speed dividers.

    Analog Fractional-N PLLs for Frequency Synthesis
    Ian Galton, UC San Diego, USA

    This lecture explains the extension of integer-N PLLs to fractional-N PLLs for both fine tuning resolution and in-loop VCO modulation. It presents an overview of modulus quantization noise shaping techniques, tradeoffs associated with quantization noise shaping order and PLL loop bandwidth, non-ideal effects of particular concern in fractional-N PLLs such as charge pump nonlinearities and data-dependent multi-modulus divider delays, techniques for increasing loop bandwidth, simulation techniques, and case studies of example circuits and applications.

    All-Digital PLL Architecture and Implementation
    Bogdan Staszewski, 
    UCD, Ireland

    The past several years has seen proliferation of all-digital phase-locked loops (ADPLL) for RF and high-performance frequency synthesis due to their clear benefits of flexibility, reconfigurability, transfer function precision, settling speed, frequency modulation capability, and amenability to integration with digital baseband and application processors. When implemented in nanoscale CMOS, the ADPLL also exhibits advantages of better performance, lower power consumption, lower area and cost over the traditional analog-intensive charge-pump PLL. In a typical ADPLL, a traditional VCO got directly replaced by a digitally controlled oscillator (DCO) for generating an output variable clock, a traditional phase/frequency detector and a charge pump got replaced by a time-to-digital converter (TDC) for detecting phase departures of the variable clock versus the frequency reference (FREF) clock, and an analog loop RC filter got replaced with a digital loop filter. The conversion gains of the DCO and TDC circuits are readily estimated and compensated using “free” but powerful digital logic. This lecture presents a system level view of the ADPLL:

    1. Principles of phase-domain frequency synthesis 2. ADPLL closed-loop behavior 3. Direct frequency modulation of ADPLL 4. Alternative TX architectures using ADPLL and PA regulator 5. Survey of published ADPLL architectures; TDC-less ADPLL; cell-based ADPLL design.

    Time-to-Digital Converter (TDC)
    Bogdan Staszewski, UCD, Ireland

    A time-to-digital converter (TDC) is used in the ADPLL to perform the phase detection. It generates a digital variable phase or timestamps of the FREF edges in the units of the DCO clock period. The variable phase is a fixed-point digital word in which the fractional part is measured with a resolution of an inverter delay (about 10 ps in 40-nm CMOS). This lecture presents a system level view of TDC as well as its circuit-level implementation issues.

    FDC-Based Digital PLLs
    Ian Galton, UC San Diego, USA

    While both analog and digital fractional-N PLLs introduce quantization error, the majority of digital PLLs developed to date introduce quantization error with higher power or higher spurious tones than comparable analog PLLs. Digital PLLs based on second-order delta-sigma frequency-to-digital conversion address this problem in that their quantization noise ideally is equivalent to that of analog PLLs with second-order delta-sigma modulation. This talk describes the underlying theory and practical implementation of digital PLLs based on frequency-to-digital conversion and illustrates the presented concepts with IC implementation details and measured results.

    Digitally-Controlled Oscillator (DCO)
    Bogdan Staszewski, UCD, Ireland

    A digitally controlled oscillator (DCO) lies at the heart of an all-digital phase-locked loop (ADPLL). It is based on an LC-tank with a negative resistance to perpetuate the oscillation— just like the traditional VCO, but with a significant difference in one of the components: instead of continuously tuned varactor (variable capacitor), the DCO now uses a large number of binary-controlled varactors. Each varactor can be placed in either high or low capacitive state. The composite varactor performs digital-to-capacitance conversion. This lecture presents a circuit system level view of DCO.

    Clock Generation and Distribution in Wireline Systems
    Sam Palermo, Texas A&M University, USA

    This talk covers clock generation and distribution schemes commonly used in wireline systems. Topics include system jitter budgeting, PLL jitter modeling, clock distribution circuitry, and multi-phase clock generation and calibration schemes.

    PLL-Based Clock and Data Recovery Systems
    Sam Palermo, Texas A&M University, USA

    This talk covers PLL-based clock and data recovery systems for wireline communication applications. Topics include basic operation, performance metrics, CDR architectures, phase and frequency detectors, and system design considerations.

    registration

    Scroll to Top





Cart