Resistive Ram And Peripheral Circuitry

Download Resistive Ram And Peripheral Circuitry PDF/ePub or read online books in Mobi eBooks. Click Download or Read Online button to get Resistive Ram And Peripheral Circuitry book now. This website allows unlimited access to, at the time of writing, more than 1.5 million titles, including hundreds of thousands of titles in various foreign languages.
Resistive RAM and Peripheral Circuitry

This book is written as an introductory textbook on Resistive Random Access Memory (ReRAM). ReRAM is a prominent emerging memory among other competing Non-Volatile Memories (NVM) seeking to replace flash memory. This book is based on the author's peer-reviewed research conducted at the Chair of Computer Architecture, FAU, Germany. Referring to his research and the most relevant research from the literature, the author presents the developments in this field concisely. The purpose is to clarify basic concepts and introduce the reader to ReRAM with an emphasis on circuit design. Hence, this book is written for university students considering a career in the semiconductor industry. Since the author's research was conducted in collaboration with a silicon foundry, hardware engineers will find this book practical and industry-relevant. Researchers in the field of In-Memory Computing will also benefit from this book since the NVM array is the basic substrate for such computing paradigms. This three-part book condenses the research and development of the last decade into eight chapters. In Part I, a good foundation is laid for understanding the individual device structure, its electrical characteristics, and modeling methodology. The different array configurations in which these memory devices are fabricated are also discussed. In Part II, the peripheral circuits -the CMOS circuits around the ReRAM array are discussed. They include sense amplifiers, programming circuits, and row/column access circuits. Recent developments such as the possibility to perform certain computing tasks in the ReRAM array are discussed in Part III.
Resistive Random Access Memory (RRAM)

RRAM technology has made significant progress in the past decade as a competitive candidate for the next generation non-volatile memory (NVM). This lecture is a comprehensive tutorial of metal oxide-based RRAM technology from device fabrication to array architecture design. State-of-the-art RRAM device performances, characterization, and modeling techniques are summarized, and the design considerations of the RRAM integration to large-scale array with peripheral circuits are discussed. Chapter 2 introduces the RRAM device fabrication techniques and methods to eliminate the forming process, and will show its scalability down to sub-10 nm regime. Then the device performances such as programming speed, variability control, and multi-level operation are presented, and finally the reliability issues such as cycling endurance and data retention are discussed. Chapter 3 discusses the RRAM physical mechanism, and the materials characterization techniques to observe the conductive filaments and the electrical characterization techniques to study the electronic conduction processes. It also presents the numerical device modeling techniques for simulating the evolution of the conductive filaments as well as the compact device modeling techniques for circuit-level design. Chapter 4 discusses the two common RRAM array architectures for large-scale integration: one-transistor-one-resistor (1T1R) and cross-point architecture with selector. The write/read schemes are presented and the peripheral circuitry design considerations are discussed. Finally, a 3D integration approach is introduced for building ultra-high density RRAM array. Chapter 5 is a brief summary and will give an outlook for RRAM’s potential novel applications beyond the NVM applications.
Emerging Topics in Hardware Security

This book provides an overview of emerging topics in the field of hardware security, such as artificial intelligence and quantum computing, and highlights how these technologies can be leveraged to secure hardware and assure electronics supply chains. The authors are experts in emerging technologies, traditional hardware design, and hardware security and trust. Readers will gain a comprehensive understanding of hardware security problems and how to overcome them through an efficient combination of conventional approaches and emerging technologies, enabling them to design secure, reliable, and trustworthy hardware.