Manuel Menghin

  • Citations Per Year
Learn More
Standby power consumption of electric devices is a growing waste of energy. Between 5% and 14% of the residential electrical power consumption is caused by devices being in standby mode. Depending on the device type, more than 50% of standby power consumption could be saved by applying state-of-the-art power management techniques. By implementing a zero(More)
Test and verification are essential parts during a product's development cycle. Simulation and emulation are well known techniques to test and verify the functionality of a design-under-test (DUT) before its tape-out. However, there are additional issues like peak power consumption and supply voltage drops, which can compromise a hardware's functionality.(More)
Many near field communication (NFC)-based reader / smart card applications are operated at a maximum magnetic field strength to increase the smart card's operational stability. However, a maximum magnetic field strength is worthwhile only in situations of high smart card power requirements (e.g., performing cryptographic operations) or long distance(More)
RFID-based and NFC-based applications can be found, apart from others, in security critical application fields, such as payment or access control. For this purpose, Elliptic-Curve Cryptography (ECC) is commonly used hardware integrated in resource constrained applications in order to provide authenticity and data integrity. On the one hand, specialized(More)
Testing hardware and software components regarding their fault detection and fault handling capabilities is of vital importance. However, considering the fact that security systems are built using several distributed hardware components (e.g., reader/smart card authentication system), testing each component individually is insufficient. Because novel(More)
Radio frequency identification (RFID) is a technology enabling a contactless exchange of data. This technology features the possibility to wirelessly transfer power to the transponder (opponent). HF-RFID is used in mobile devices like smart phones and shows potential for applications like payment, identification, etc. Unfortunately, the needed functionality(More)
More than 500 million Near Field Communication (NFC) devices will be delivered in 2014. This technology enables a lot of application fields like using it for bridges to embedded systems (e.g., smart meters). With this wireless bridge the user can interact with the embedded system using an off-the-shelf NFC-enabled smart phone. The user of such a bridge also(More)
Resource management is important because of the rising diversity and the resource constraints, like energy, of embedded systems. Energy-constraints are especially challenging in mobile systems like smart phones. A solution to deal with these constraints are power-management techniques that are often only general design principles. Consequently,(More)
Design exploration and evaluation are essential tasks during a product’s development cycle. Simulation and hardware emulation are common techniques to explore and evaluate the functionality of hardware / software designs. However, when it comes to distributed secure applications, like contactless reader / smart card systems, non-functional design properties(More)